Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-38542 (GCVE-0-2024-38542)
Vulnerability from cvelistv5 – Published: 2024-06-19 13:35 – Updated: 2025-05-04 09:13| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
cf9cc859d6ff37ce52c09dfbb169b9ee25595a3f , < f12afddfb142587d786df9e3cc4862190d3e2ec8
(git)
Affected: 2a31c5a7e0d87959a03e846523013c75f4395a91 , < 168f6fbde0eabd71d1f4133df7d001a950b96977 (git) Affected: 2a31c5a7e0d87959a03e846523013c75f4395a91 , < f79edef79b6a2161f4124112f9b0c46891bb0b74 (git) |
||
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-38542",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-06-20T15:44:47.071270Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-11-07T16:22:42.359Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T04:12:25.624Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/f12afddfb142587d786df9e3cc4862190d3e2ec8"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/168f6fbde0eabd71d1f4133df7d001a950b96977"
},
{
"tags": [
"x_transferred"
],
"url": "https://git.kernel.org/stable/c/f79edef79b6a2161f4124112f9b0c46891bb0b74"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"drivers/infiniband/hw/mana/cq.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "f12afddfb142587d786df9e3cc4862190d3e2ec8",
"status": "affected",
"version": "cf9cc859d6ff37ce52c09dfbb169b9ee25595a3f",
"versionType": "git"
},
{
"lessThan": "168f6fbde0eabd71d1f4133df7d001a950b96977",
"status": "affected",
"version": "2a31c5a7e0d87959a03e846523013c75f4395a91",
"versionType": "git"
},
{
"lessThan": "f79edef79b6a2161f4124112f9b0c46891bb0b74",
"status": "affected",
"version": "2a31c5a7e0d87959a03e846523013c75f4395a91",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"drivers/infiniband/hw/mana/cq.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "6.9"
},
{
"lessThan": "6.9",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.8.*",
"status": "unaffected",
"version": "6.8.12",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.9.*",
"status": "unaffected",
"version": "6.9.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "6.10",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.8.12",
"versionStartIncluding": "6.8.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.3",
"versionStartIncluding": "6.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.10",
"versionStartIncluding": "6.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mana_ib: boundary check before installing cq callbacks\n\nAdd a boundary check inside mana_ib_install_cq_cb to prevent index overflow."
}
],
"providerMetadata": {
"dateUpdated": "2025-05-04T09:13:37.699Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/f12afddfb142587d786df9e3cc4862190d3e2ec8"
},
{
"url": "https://git.kernel.org/stable/c/168f6fbde0eabd71d1f4133df7d001a950b96977"
},
{
"url": "https://git.kernel.org/stable/c/f79edef79b6a2161f4124112f9b0c46891bb0b74"
}
],
"title": "RDMA/mana_ib: boundary check before installing cq callbacks",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2024-38542",
"datePublished": "2024-06-19T13:35:17.310Z",
"dateReserved": "2024-06-18T19:36:34.919Z",
"dateUpdated": "2025-05-04T09:13:37.699Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nRDMA/mana_ib: boundary check before installing cq callbacks\\n\\nAdd a boundary check inside mana_ib_install_cq_cb to prevent index overflow.\"}, {\"lang\": \"es\", \"value\": \"En el kernel de Linux, se resolvi\\u00f3 la siguiente vulnerabilidad: RDMA/mana_ib: verificaci\\u00f3n de los l\\u00edmites antes de instalar devoluciones de llamadas de cq Agregue una verificaci\\u00f3n de los l\\u00edmites dentro de mana_ib_install_cq_cb para evitar el desbordamiento del \\u00edndice.\"}]",
"id": "CVE-2024-38542",
"lastModified": "2024-11-21T09:26:17.937",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H\", \"baseScore\": 7.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.2}]}",
"published": "2024-06-19T14:15:14.487",
"references": "[{\"url\": \"https://git.kernel.org/stable/c/168f6fbde0eabd71d1f4133df7d001a950b96977\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/f12afddfb142587d786df9e3cc4862190d3e2ec8\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/f79edef79b6a2161f4124112f9b0c46891bb0b74\", \"source\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}, {\"url\": \"https://git.kernel.org/stable/c/168f6fbde0eabd71d1f4133df7d001a950b96977\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/f12afddfb142587d786df9e3cc4862190d3e2ec8\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://git.kernel.org/stable/c/f79edef79b6a2161f4124112f9b0c46891bb0b74\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-38542\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-06-19T14:15:14.487\",\"lastModified\":\"2025-04-01T18:36:50.130\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nRDMA/mana_ib: boundary check before installing cq callbacks\\n\\nAdd a boundary check inside mana_ib_install_cq_cb to prevent index overflow.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: RDMA/mana_ib: verificaci\u00f3n de los l\u00edmites antes de instalar devoluciones de llamadas de cq Agregue una verificaci\u00f3n de los l\u00edmites dentro de mana_ib_install_cq_cb para evitar el desbordamiento del \u00edndice.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-129\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.8.2\",\"versionEndExcluding\":\"6.8.12\",\"matchCriteriaId\":\"6B700363-C7D6-4F81-97AB-953F84ED37B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.9\",\"versionEndExcluding\":\"6.9.3\",\"matchCriteriaId\":\"E07124C1-19E8-4D21-828D-9932A01D3011\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/168f6fbde0eabd71d1f4133df7d001a950b96977\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f12afddfb142587d786df9e3cc4862190d3e2ec8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f79edef79b6a2161f4124112f9b0c46891bb0b74\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/168f6fbde0eabd71d1f4133df7d001a950b96977\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f12afddfb142587d786df9e3cc4862190d3e2ec8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/f79edef79b6a2161f4124112f9b0c46891bb0b74\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://git.kernel.org/stable/c/f12afddfb142587d786df9e3cc4862190d3e2ec8\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/168f6fbde0eabd71d1f4133df7d001a950b96977\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://git.kernel.org/stable/c/f79edef79b6a2161f4124112f9b0c46891bb0b74\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T04:12:25.624Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.1, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-38542\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-06-20T15:44:47.071270Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-20T15:44:55.519Z\"}}], \"cna\": {\"title\": \"RDMA/mana_ib: boundary check before installing cq callbacks\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"cf9cc859d6ff37ce52c09dfbb169b9ee25595a3f\", \"lessThan\": \"f12afddfb142587d786df9e3cc4862190d3e2ec8\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2a31c5a7e0d87959a03e846523013c75f4395a91\", \"lessThan\": \"168f6fbde0eabd71d1f4133df7d001a950b96977\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"2a31c5a7e0d87959a03e846523013c75f4395a91\", \"lessThan\": \"f79edef79b6a2161f4124112f9b0c46891bb0b74\", \"versionType\": \"git\"}], \"programFiles\": [\"drivers/infiniband/hw/mana/cq.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.9\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"6.9\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.8.12\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.8.*\"}, {\"status\": \"unaffected\", \"version\": \"6.9.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.9.*\"}, {\"status\": \"unaffected\", \"version\": \"6.10\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"drivers/infiniband/hw/mana/cq.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/f12afddfb142587d786df9e3cc4862190d3e2ec8\"}, {\"url\": \"https://git.kernel.org/stable/c/168f6fbde0eabd71d1f4133df7d001a950b96977\"}, {\"url\": \"https://git.kernel.org/stable/c/f79edef79b6a2161f4124112f9b0c46891bb0b74\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nRDMA/mana_ib: boundary check before installing cq callbacks\\n\\nAdd a boundary check inside mana_ib_install_cq_cb to prevent index overflow.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.8.12\", \"versionStartIncluding\": \"6.8.2\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.9.3\", \"versionStartIncluding\": \"6.9\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.10\", \"versionStartIncluding\": \"6.9\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2025-05-04T09:13:37.699Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-38542\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-04T09:13:37.699Z\", \"dateReserved\": \"2024-06-18T19:36:34.919Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2024-06-19T13:35:17.310Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
SUSE-SU-2026:1041-1
Vulnerability from csaf_suse - Published: 2026-03-25 14:13 - Updated: 2026-03-25 14:13{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2023-53817: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() (bsc#1254992).\n- CVE-2024-38542: RDMA/mana_ib: boundary check before installing cq callbacks (bsc#1226591).\n- CVE-2025-37861: scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue (bsc#1243055).\n- CVE-2025-39817: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (bsc#1249998).\n- CVE-2025-39964: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg (bsc#1251966).\n- CVE-2025-40099: cifs: parse_dfs_referrals: prevent oob on malformed input (bsc#1252911).\n- CVE-2025-40103: smb: client: Fix refcount leak for cifs_sb_tlink (bsc#1252924).\n- CVE-2025-40253: s390/ctcm: Fix double-kfree (bsc#1255084).\n- CVE-2025-71066: net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change (bsc#1256645).\n- CVE-2025-71113: crypto: af_alg - zero initialize memory allocated via sock_kmalloc (bsc#1256716).\n- CVE-2025-71231: crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode (bsc#1258424).\n- CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() (bsc#1257231).\n- CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen\u003c8) to match ESP/ESN spec (bsc#1257735).\n- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749).\n- CVE-2026-23089: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() (bsc#1257790).\n- CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() (bsc#1258181).\n- CVE-2026-23141: btrfs: send: check for inline extents in range_is_hole_in_parent() (bsc#1258377).\n- CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258395).\n- CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful() (bsc#1258340).\n- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258518).\n- CVE-2026-23214: btrfs: reject new transactions if the fs is fully read-only (bsc#1258464).\n- CVE-2026-23268: apparmor: fix unprivileged local user can do privileged policy management (bsc#1258850).\n- CVE-2026-23269: apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1259857).\n\nThe following non-security bugs were fixed:\n\n- Add bugnumber to existing mana change (bsc#1251971).\n- Drivers: hv: fix missing kernel-doc description for \u0027size\u0027 in request_arr_init() (git-fixes).\n- Drivers: hv: remove stale comment (git-fixes).\n- Drivers: hv: vmbus: Clean up sscanf format specifier in target_cpu_store() (git-fixes).\n- Drivers: hv: vmbus: Fix sysfs output format for ring buffer index (git-fixes).\n- Drivers: hv: vmbus: Fix typos in vmbus_drv.c (git-fixes).\n- PCI: hv: Correct a comment (git-fixes).\n- PCI: hv: Remove unnecessary flex array in struct pci_packet (git-fixes).\n- PCI: hv: Remove unused field pci_bus in struct hv_pcibus_device (git-fixes).\n- PCI: hv: remove unnecessary module_init/exit functions (git-fixes).\n- RDMA/mana_ib: Access remote atomic for MRs (bsc#1251135).\n- RDMA/mana_ib: Add EQ creation for rnic adapter (git-fixes).\n- RDMA/mana_ib: Add device statistics support (git-fixes).\n- RDMA/mana_ib: Add device-memory support (git-fixes).\n- RDMA/mana_ib: Add port statistics support (git-fixes).\n- RDMA/mana_ib: Add support of 4M, 1G, and 2G pages (git-fixes).\n- RDMA/mana_ib: Add support of mana_ib for RNIC and ETH nic (git-fixes).\n- RDMA/mana_ib: Adding and deleting GIDs (git-fixes).\n- RDMA/mana_ib: Allow registration of DMA-mapped memory in PDs (git-fixes).\n- RDMA/mana_ib: Configure mac address in RNIC (git-fixes).\n- RDMA/mana_ib: Create and destroy RC QP (git-fixes).\n- RDMA/mana_ib: Create and destroy UD/GSI QP (git-fixes).\n- RDMA/mana_ib: Create and destroy rnic adapter (git-fixes).\n- RDMA/mana_ib: Drain send wrs of GSI QP (git-fixes).\n- RDMA/mana_ib: Enable RoCE on port 1 (git-fixes).\n- RDMA/mana_ib: Extend modify QP (git-fixes).\n- RDMA/mana_ib: Fix DSCP value in modify QP (git-fixes).\n- RDMA/mana_ib: Fix error code in probe() (git-fixes).\n- RDMA/mana_ib: Fix integer overflow during queue creation (bsc#1251135).\n- RDMA/mana_ib: Fix missing ret value (git-fixes).\n- RDMA/mana_ib: Handle net event for pointing to the current netdev (bsc#1256690).\n- RDMA/mana_ib: Implement DMABUF MR support (git-fixes).\n- RDMA/mana_ib: Implement port parameters (git-fixes).\n- RDMA/mana_ib: Implement uapi to create and destroy RC QP (git-fixes).\n- RDMA/mana_ib: Introduce helpers to create and destroy mana queues (git-fixes).\n- RDMA/mana_ib: Introduce mana_ib_get_netdev helper function (git-fixes).\n- RDMA/mana_ib: Introduce mana_ib_install_cq_cb helper function (git-fixes).\n- RDMA/mana_ib: Introduce mdev_to_gc helper function (git-fixes).\n- RDMA/mana_ib: Modify QP state (git-fixes).\n- RDMA/mana_ib: Process QP error events in mana_ib (git-fixes).\n- RDMA/mana_ib: Query feature_flags bitmask from FW (git-fixes).\n- RDMA/mana_ib: Set correct device into ib (git-fixes).\n- RDMA/mana_ib: Take CQ type from the device type (git-fixes).\n- RDMA/mana_ib: UD/GSI QP creation for kernel (git-fixes).\n- RDMA/mana_ib: UD/GSI work requests (git-fixes).\n- RDMA/mana_ib: Use num_comp_vectors of ib_device (git-fixes).\n- RDMA/mana_ib: Use safer allocation function() (bsc#1251135).\n- RDMA/mana_ib: Use struct mana_ib_queue for CQs (git-fixes).\n- RDMA/mana_ib: Use struct mana_ib_queue for RAW QPs (git-fixes).\n- RDMA/mana_ib: Use struct mana_ib_queue for WQs (git-fixes).\n- RDMA/mana_ib: add additional port counters (bsc#1251135).\n- RDMA/mana_ib: add support of multiple ports (bsc#1251135).\n- RDMA/mana_ib: check cqe length for kernel CQs (git-fixes).\n- RDMA/mana_ib: create EQs for RNIC CQs (git-fixes).\n- RDMA/mana_ib: create and destroy RNIC cqs (git-fixes).\n- RDMA/mana_ib: create kernel-level CQs (git-fixes).\n- RDMA/mana_ib: create/destroy AH (git-fixes).\n- RDMA/mana_ib: extend mana QP table (git-fixes).\n- RDMA/mana_ib: extend query device (git-fixes).\n- RDMA/mana_ib: helpers to allocate kernel queues (git-fixes).\n- RDMA/mana_ib: implement get_dma_mr (git-fixes).\n- RDMA/mana_ib: implement req_notify_cq (git-fixes).\n- RDMA/mana_ib: implement uapi for creation of rnic cq (git-fixes).\n- RDMA/mana_ib: indicate CM support (git-fixes).\n- RDMA/mana_ib: introduce a helper to remove cq callbacks (git-fixes).\n- RDMA/mana_ib: polling of CQs for GSI/UD (git-fixes).\n- RDMA/mana_ib: remove useless return values from dbg prints (git-fixes).\n- RDMA/mana_ib: request error CQEs when supported (git-fixes).\n- RDMA/mana_ib: set node_guid (git-fixes).\n- RDMA/mana_ib: support of the zero based MRs (bsc#1251135).\n- RDMA/mana_ib: unify mana_ib functions to support any gdma device (git-fixes).\n- apparmor: Fix double free of ns_name in aa_replace_profiles() (bsc#1258849).\n- apparmor: fix differential encoding verification (bsc#1258849).\n- apparmor: fix memory leak in verify_header (bsc#1258849).\n- apparmor: fix missing bounds check on DEFAULT table in verify_dfa() (bsc#1258849).\n- apparmor: fix race between freeing data and fs accessing it (bsc#1258849).\n- apparmor: fix race on rawdata dereference (bsc#1258849).\n- apparmor: fix side-effect bug in match_char() macro usage (bsc#1258849).\n- apparmor: fix unprivileged local user can do privileged policy management (bsc#1258849).\n- apparmor: fix: limit the number of levels of policy namespaces (bsc#1258849).\n- apparmor: replace recursive profile removal with iterative approach (bsc#1258849).\n- apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1258849).\n- btrfs: scrub: always update btrfs_scrub_progress::last_physical (git-fixes).\n- cifs: add xid to query server interface call (git-fixes).\n- clocksource: Print durations for sync check unconditionally (bsc#1241345).\n- clocksource: Reduce watchdog readout delay limit to prevent false positives (bsc#1241345).\n- hv/hv_kvp_daemon: Handle IPv4 and Ipv6 combination for keyfile format (git-fixes).\n- hv/hv_kvp_daemon: Pass NIC name to hv_get_dns_info as well (git-fixes).\n- net/mana: Null service_wq on setup error to prevent double destroy (git-fix).\n- net: mana: Add metadata support for xdp mode (git-fixes).\n- net: mana: Add standard counter rx_missed_errors (git-fixes).\n- net: mana: Add support for auxiliary device servicing events (bsc#1251971).\n- net: mana: Change the function signature of mana_get_primary_netdev_rcu (bsc#1256690).\n- net: mana: Drop TX skb on post_work_request failure and unmap resources (git-fixes).\n- net: mana: Fix double destroy_workqueue on service rescan PCI path (git-fixes).\n- net: mana: Fix use-after-free in reset service rescan path (git-fixes).\n- net: mana: Fix warnings for missing export.h header inclusion (git-fixes).\n- net: mana: Handle Reset Request from MANA NIC (bsc#1245728 bsc#1251971).\n- net: mana: Handle SKB if TX SGEs exceed hardware limit (git-fixes).\n- net: mana: Handle hardware recovery events when probing the device (bsc#1257466).\n- net: mana: Handle unsupported HWC commands (git-fixes).\n- net: mana: Implement ndo_tx_timeout and serialize queue resets per port (bsc#1257472).\n- net: mana: Move hardware counter stats from per-port to per-VF context (git-fixes).\n- net: mana: Probe rdma device in mana driver (git-fixes).\n- net: mana: Reduce waiting time if HWC not responding (bsc#1252266).\n- net: mana: Ring doorbell at 4 CQ wraparounds (git-fixes).\n- net: mana: Support HW link state events (bsc#1253049).\n- net: mana: Use mana_cleanup_port_context() for rxq cleanup (git-fixes).\n- net: mana: fix spelling for mana_gd_deregiser_irq() (git-fixes).\n- net: mana: use ethtool string helpers (git-fixes).\n- s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP (bsc#1254306).\n- scsi: mpi3mr: Event processing debug improvement (bsc#1251186, bsc#1258832).\n- scsi: storvsc: Fix scheduling while atomic on PREEMPT_RT (git-fixes).\n- scsi: storvsc: Remove redundant ternary operators (git-fixes).\n- shrink_slab_memcg: clear_bits of skipped shrinkers (bsc#1256564).\n- spi: tegra210-quad: Move curr_xfer read inside spinlock (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer assignment in (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer check in IRQ handler (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer clearing in (bsc#1257952)\n- spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer (bsc#1257952)\n- spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed (bsc#1257952)\n- tools/hv: add a .gitignore file (git-fixes).\n- tools/hv: reduce resouce usage in hv_get_dns_info helper (git-fixes).\n- tools/hv: reduce resource usage in hv_kvp_daemon (git-fixes).\n- tools: hv: Enable debug logs for hv_kvp_daemon (git-fixes).\n- tools: hv: lsvmbus: change shebang to use python3 (git-fixes).\n- workqueue: mark power efficient workqueue as unbounded if (bsc#1257891)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1041,SUSE-SLE-Module-Live-Patching-15-SP6-2026-1041,SUSE-SLE-Product-HA-15-SP6-2026-1041,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1041,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1041,openSUSE-SLE-15.6-2026-1041",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1041-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1041-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261041-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1041-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html"
},
{
"category": "self",
"summary": "SUSE Bug 1226591",
"url": "https://bugzilla.suse.com/1226591"
},
{
"category": "self",
"summary": "SUSE Bug 1241345",
"url": "https://bugzilla.suse.com/1241345"
},
{
"category": "self",
"summary": "SUSE Bug 1243055",
"url": "https://bugzilla.suse.com/1243055"
},
{
"category": "self",
"summary": "SUSE Bug 1245728",
"url": "https://bugzilla.suse.com/1245728"
},
{
"category": "self",
"summary": "SUSE Bug 1249998",
"url": "https://bugzilla.suse.com/1249998"
},
{
"category": "self",
"summary": "SUSE Bug 1251135",
"url": "https://bugzilla.suse.com/1251135"
},
{
"category": "self",
"summary": "SUSE Bug 1251186",
"url": "https://bugzilla.suse.com/1251186"
},
{
"category": "self",
"summary": "SUSE Bug 1251966",
"url": "https://bugzilla.suse.com/1251966"
},
{
"category": "self",
"summary": "SUSE Bug 1251971",
"url": "https://bugzilla.suse.com/1251971"
},
{
"category": "self",
"summary": "SUSE Bug 1252266",
"url": "https://bugzilla.suse.com/1252266"
},
{
"category": "self",
"summary": "SUSE Bug 1252911",
"url": "https://bugzilla.suse.com/1252911"
},
{
"category": "self",
"summary": "SUSE Bug 1252924",
"url": "https://bugzilla.suse.com/1252924"
},
{
"category": "self",
"summary": "SUSE Bug 1253049",
"url": "https://bugzilla.suse.com/1253049"
},
{
"category": "self",
"summary": "SUSE Bug 1254306",
"url": "https://bugzilla.suse.com/1254306"
},
{
"category": "self",
"summary": "SUSE Bug 1254992",
"url": "https://bugzilla.suse.com/1254992"
},
{
"category": "self",
"summary": "SUSE Bug 1255084",
"url": "https://bugzilla.suse.com/1255084"
},
{
"category": "self",
"summary": "SUSE Bug 1256564",
"url": "https://bugzilla.suse.com/1256564"
},
{
"category": "self",
"summary": "SUSE Bug 1256645",
"url": "https://bugzilla.suse.com/1256645"
},
{
"category": "self",
"summary": "SUSE Bug 1256690",
"url": "https://bugzilla.suse.com/1256690"
},
{
"category": "self",
"summary": "SUSE Bug 1256716",
"url": "https://bugzilla.suse.com/1256716"
},
{
"category": "self",
"summary": "SUSE Bug 1257231",
"url": "https://bugzilla.suse.com/1257231"
},
{
"category": "self",
"summary": "SUSE Bug 1257466",
"url": "https://bugzilla.suse.com/1257466"
},
{
"category": "self",
"summary": "SUSE Bug 1257472",
"url": "https://bugzilla.suse.com/1257472"
},
{
"category": "self",
"summary": "SUSE Bug 1257473",
"url": "https://bugzilla.suse.com/1257473"
},
{
"category": "self",
"summary": "SUSE Bug 1257732",
"url": "https://bugzilla.suse.com/1257732"
},
{
"category": "self",
"summary": "SUSE Bug 1257735",
"url": "https://bugzilla.suse.com/1257735"
},
{
"category": "self",
"summary": "SUSE Bug 1257749",
"url": "https://bugzilla.suse.com/1257749"
},
{
"category": "self",
"summary": "SUSE Bug 1257790",
"url": "https://bugzilla.suse.com/1257790"
},
{
"category": "self",
"summary": "SUSE Bug 1257891",
"url": "https://bugzilla.suse.com/1257891"
},
{
"category": "self",
"summary": "SUSE Bug 1257952",
"url": "https://bugzilla.suse.com/1257952"
},
{
"category": "self",
"summary": "SUSE Bug 1258181",
"url": "https://bugzilla.suse.com/1258181"
},
{
"category": "self",
"summary": "SUSE Bug 1258338",
"url": "https://bugzilla.suse.com/1258338"
},
{
"category": "self",
"summary": "SUSE Bug 1258340",
"url": "https://bugzilla.suse.com/1258340"
},
{
"category": "self",
"summary": "SUSE Bug 1258376",
"url": "https://bugzilla.suse.com/1258376"
},
{
"category": "self",
"summary": "SUSE Bug 1258377",
"url": "https://bugzilla.suse.com/1258377"
},
{
"category": "self",
"summary": "SUSE Bug 1258395",
"url": "https://bugzilla.suse.com/1258395"
},
{
"category": "self",
"summary": "SUSE Bug 1258424",
"url": "https://bugzilla.suse.com/1258424"
},
{
"category": "self",
"summary": "SUSE Bug 1258464",
"url": "https://bugzilla.suse.com/1258464"
},
{
"category": "self",
"summary": "SUSE Bug 1258518",
"url": "https://bugzilla.suse.com/1258518"
},
{
"category": "self",
"summary": "SUSE Bug 1258524",
"url": "https://bugzilla.suse.com/1258524"
},
{
"category": "self",
"summary": "SUSE Bug 1258832",
"url": "https://bugzilla.suse.com/1258832"
},
{
"category": "self",
"summary": "SUSE Bug 1258849",
"url": "https://bugzilla.suse.com/1258849"
},
{
"category": "self",
"summary": "SUSE Bug 1258850",
"url": "https://bugzilla.suse.com/1258850"
},
{
"category": "self",
"summary": "SUSE Bug 1258928",
"url": "https://bugzilla.suse.com/1258928"
},
{
"category": "self",
"summary": "SUSE Bug 1259070",
"url": "https://bugzilla.suse.com/1259070"
},
{
"category": "self",
"summary": "SUSE Bug 1259857",
"url": "https://bugzilla.suse.com/1259857"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-53817 page",
"url": "https://www.suse.com/security/cve/CVE-2023-53817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38542 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-37861 page",
"url": "https://www.suse.com/security/cve/CVE-2025-37861/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39817 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39964 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40099 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40103 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40253 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71066 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71066/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71113 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71113/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23004 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23054 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23054/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23060 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23060/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23074 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23089 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23089/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23111 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23141 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23157 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23191 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23202 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23202/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23204 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23207 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23209 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23209/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23214 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23214/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23268 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23268/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23269 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23269/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-03-25T14:13:20Z",
"generator": {
"date": "2026-03-25T14:13:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1041-1",
"initial_release_date": "2026-03-25T14:13:20Z",
"revision_history": [
{
"date": "2026-03-25T14:13:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"product_id": "cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"product_id": "dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"product_id": "dlm-kmp-default-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-allwinner-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-altera-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-altera-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-amazon-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-amd-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-amd-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-amlogic-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-apm-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-apm-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apple-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-apple-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-apple-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-arm-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-arm-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-broadcom-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-cavium-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-exynos-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-freescale-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-hisilicon-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-lg-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-lg-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-marvell-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-mediatek-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-nvidia-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-qcom-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-renesas-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-rockchip-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-socionext-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-sprd-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"product_id": "dtb-xilinx-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"product_id": "gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"product_id": "kernel-64kb-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"product_id": "kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"product_id": "kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"product_id": "kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "kernel-default-6.4.0-150600.23.92.1.aarch64",
"product_id": "kernel-default-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"product": {
"name": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"product_id": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"product_id": "kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"product_id": "kernel-default-devel-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"product_id": "kernel-default-extra-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"product_id": "kernel-default-optional-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"product_id": "kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"product_id": "kernel-obs-build-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"product_id": "kernel-obs-qa-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "kernel-syms-6.4.0-150600.23.92.1.aarch64",
"product_id": "kernel-syms-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"product_id": "kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"product_id": "ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"product_id": "reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.4.0-150600.23.92.1.noarch",
"product": {
"name": "kernel-devel-6.4.0-150600.23.92.1.noarch",
"product_id": "kernel-devel-6.4.0-150600.23.92.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-6.4.0-150600.23.92.1.noarch",
"product": {
"name": "kernel-docs-6.4.0-150600.23.92.1.noarch",
"product_id": "kernel-docs-6.4.0-150600.23.92.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"product": {
"name": "kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"product_id": "kernel-docs-html-6.4.0-150600.23.92.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.4.0-150600.23.92.1.noarch",
"product": {
"name": "kernel-macros-6.4.0-150600.23.92.1.noarch",
"product_id": "kernel-macros-6.4.0-150600.23.92.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.4.0-150600.23.92.1.noarch",
"product": {
"name": "kernel-source-6.4.0-150600.23.92.1.noarch",
"product_id": "kernel-source-6.4.0-150600.23.92.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"product": {
"name": "kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"product_id": "kernel-source-vanilla-6.4.0-150600.23.92.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"product_id": "dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"product": {
"name": "kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"product_id": "kernel-debug-6.4.0-150600.23.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"product": {
"name": "kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"product_id": "kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.92.1.ppc64le",
"product": {
"name": "kernel-default-6.4.0-150600.23.92.1.ppc64le",
"product_id": "kernel-default-6.4.0-150600.23.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"product": {
"name": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"product_id": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"product_id": "kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"product_id": "kernel-default-devel-6.4.0-150600.23.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"product_id": "kernel-default-extra-6.4.0-150600.23.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"product_id": "kernel-default-optional-6.4.0-150600.23.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"product_id": "kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"product": {
"name": "kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"product_id": "kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"product_id": "kernel-obs-build-6.4.0-150600.23.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"product_id": "kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"product": {
"name": "kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"product_id": "kernel-syms-6.4.0-150600.23.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"product_id": "dlm-kmp-default-6.4.0-150600.23.92.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.92.1.s390x",
"product": {
"name": "kernel-default-6.4.0-150600.23.92.1.s390x",
"product_id": "kernel-default-6.4.0-150600.23.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"product_id": "kernel-default-devel-6.4.0-150600.23.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"product_id": "kernel-default-extra-6.4.0-150600.23.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"product_id": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"product_id": "kernel-default-optional-6.4.0-150600.23.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"product": {
"name": "kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"product_id": "kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"product_id": "kernel-obs-build-6.4.0-150600.23.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"product_id": "kernel-obs-qa-6.4.0-150600.23.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.92.1.s390x",
"product": {
"name": "kernel-syms-6.4.0-150600.23.92.1.s390x",
"product_id": "kernel-syms-6.4.0-150600.23.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"product": {
"name": "kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"product_id": "kernel-zfcpdump-6.4.0-150600.23.92.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.92.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"product_id": "dlm-kmp-default-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "kernel-debug-6.4.0-150600.23.92.1.x86_64",
"product_id": "kernel-debug-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"product_id": "kernel-debug-devel-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"product_id": "kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "kernel-default-6.4.0-150600.23.92.1.x86_64",
"product_id": "kernel-default-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"product": {
"name": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"product_id": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"product_id": "kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"product_id": "kernel-default-devel-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"product_id": "kernel-default-extra-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"product_id": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"product_id": "kernel-default-optional-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"product_id": "kernel-default-vdso-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"product_id": "kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"product_id": "kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"product_id": "kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"product_id": "kernel-obs-build-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"product_id": "kernel-obs-qa-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "kernel-syms-6.4.0-150600.23.92.1.x86_64",
"product_id": "kernel-syms-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.92.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le"
},
"product_reference": "kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x"
},
"product_reference": "kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.4.0-150600.23.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-default-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-default-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "kernel-default-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-default-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-150600.23.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch"
},
"product_reference": "kernel-devel-6.4.0-150600.23.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.4.0-150600.23.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch"
},
"product_reference": "kernel-docs-6.4.0-150600.23.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-150600.23.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch"
},
"product_reference": "kernel-macros-6.4.0-150600.23.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-150600.23.92.1.noarch as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch"
},
"product_reference": "kernel-source-6.4.0-150600.23.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "kernel-syms-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.4.0-150600.23.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-default-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-default-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-150600.23.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch"
},
"product_reference": "kernel-devel-6.4.0-150600.23.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.4.0-150600.23.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch"
},
"product_reference": "kernel-docs-6.4.0-150600.23.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-150600.23.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch"
},
"product_reference": "kernel-macros-6.4.0-150600.23.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-150600.23.92.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch"
},
"product_reference": "kernel-source-6.4.0-150600.23.92.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-allwinner-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-altera-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-altera-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amazon-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amd-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-amd-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amlogic-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apm-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-apm-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apple-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-apple-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-arm-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-arm-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-broadcom-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-cavium-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-exynos-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-freescale-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-hisilicon-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-lg-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-lg-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-marvell-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-mediatek-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-nvidia-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-qcom-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-renesas-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-rockchip-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-socionext-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-sprd-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-xilinx-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-6.4.0-150600.23.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-debug-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-default-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-default-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "kernel-default-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-default-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64"
},
"product_reference": "kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le"
},
"product_reference": "kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64"
},
"product_reference": "kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-vdso-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-150600.23.92.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch"
},
"product_reference": "kernel-devel-6.4.0-150600.23.92.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.4.0-150600.23.92.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch"
},
"product_reference": "kernel-docs-6.4.0-150600.23.92.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-6.4.0-150600.23.92.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch"
},
"product_reference": "kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-150600.23.92.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch"
},
"product_reference": "kernel-macros-6.4.0-150600.23.92.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-150600.23.92.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch"
},
"product_reference": "kernel-source-6.4.0-150600.23.92.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.4.0-150600.23.92.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch"
},
"product_reference": "kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "kernel-syms-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.4.0-150600.23.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-53817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-53817"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()\n\nDuring NVMeTCP Authentication a controller can trigger a kernel\noops by specifying the 8192 bit Diffie Hellman group and passing\na correctly sized, but zeroed Diffie Hellamn value.\nmpi_cmp_ui() was detecting this if the second parameter was 0,\nbut 1 is passed from dh_is_pubkey_valid(). This causes the null\npointer u-\u003ed to be dereferenced towards the end of mpi_cmp_ui()",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-53817",
"url": "https://www.suse.com/security/cve/CVE-2023-53817"
},
{
"category": "external",
"summary": "SUSE Bug 1254992 for CVE-2023-53817",
"url": "https://bugzilla.suse.com/1254992"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-53817"
},
{
"cve": "CVE-2024-38542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38542"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mana_ib: boundary check before installing cq callbacks\n\nAdd a boundary check inside mana_ib_install_cq_cb to prevent index overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38542",
"url": "https://www.suse.com/security/cve/CVE-2024-38542"
},
{
"category": "external",
"summary": "SUSE Bug 1226591 for CVE-2024-38542",
"url": "https://bugzilla.suse.com/1226591"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "moderate"
}
],
"title": "CVE-2024-38542"
},
{
"cve": "CVE-2025-37861",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-37861"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue\n\nWhen the task management thread processes reply queues while the reset\nthread resets them, the task management thread accesses an invalid queue ID\n(0xFFFF), set by the reset thread, which points to unallocated memory,\ncausing a crash.\n\nAdd flag \u0027io_admin_reset_sync\u0027 to synchronize access between the reset,\nI/O, and admin threads. Before a reset, the reset handler sets this flag to\nblock I/O and admin processing threads. If any thread bypasses the initial\ncheck, the reset thread waits up to 10 seconds for processing to finish. If\nthe wait exceeds 10 seconds, the controller is marked as unrecoverable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-37861",
"url": "https://www.suse.com/security/cve/CVE-2025-37861"
},
{
"category": "external",
"summary": "SUSE Bug 1243055 for CVE-2025-37861",
"url": "https://bugzilla.suse.com/1243055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-37861"
},
{
"cve": "CVE-2025-39817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39817"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: Fix slab-out-of-bounds in efivarfs_d_compare\n\nObserved on kernel 6.6 (present on master as well):\n\n BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0\n Call trace:\n kasan_check_range+0xe8/0x190\n __asan_loadN+0x1c/0x28\n memcmp+0x98/0xd0\n efivarfs_d_compare+0x68/0xd8\n __d_lookup_rcu_op_compare+0x178/0x218\n __d_lookup_rcu+0x1f8/0x228\n d_alloc_parallel+0x150/0x648\n lookup_open.isra.0+0x5f0/0x8d0\n open_last_lookups+0x264/0x828\n path_openat+0x130/0x3f8\n do_filp_open+0x114/0x248\n do_sys_openat2+0x340/0x3c0\n __arm64_sys_openat+0x120/0x1a0\n\nIf dentry-\u003ed_name.len \u003c EFI_VARIABLE_GUID_LEN , \u0027guid\u0027 can become\nnegative, leadings to oob. The issue can be triggered by parallel\nlookups using invalid filename:\n\n T1\t\t\tT2\n lookup_open\n -\u003elookup\n simple_lookup\n d_add\n // invalid dentry is added to hash list\n\n\t\t\tlookup_open\n\t\t\t d_alloc_parallel\n\t\t\t __d_lookup_rcu\n\t\t\t __d_lookup_rcu_op_compare\n\t\t\t hlist_bl_for_each_entry_rcu\n\t\t\t // invalid dentry can be retrieved\n\t\t\t -\u003ed_compare\n\t\t\t efivarfs_d_compare\n\t\t\t // oob\n\nFix it by checking \u0027guid\u0027 before cmp.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39817",
"url": "https://www.suse.com/security/cve/CVE-2025-39817"
},
{
"category": "external",
"summary": "SUSE Bug 1249998 for CVE-2025-39817",
"url": "https://bugzilla.suse.com/1249998"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-39817"
},
{
"cve": "CVE-2025-39964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39964"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: af_alg - Disallow concurrent writes in af_alg_sendmsg\n\nIssuing two writes to the same af_alg socket is bogus as the\ndata will be interleaved in an unpredictable fashion. Furthermore,\nconcurrent writes may create inconsistencies in the internal\nsocket state.\n\nDisallow this by adding a new ctx-\u003ewrite field that indiciates\nexclusive ownership for writing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39964",
"url": "https://www.suse.com/security/cve/CVE-2025-39964"
},
{
"category": "external",
"summary": "SUSE Bug 1251966 for CVE-2025-39964",
"url": "https://bugzilla.suse.com/1251966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-39964"
},
{
"cve": "CVE-2025-40099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40099"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: parse_dfs_referrals: prevent oob on malformed input\n\nMalicious SMB server can send invalid reply to FSCTL_DFS_GET_REFERRALS\n\n- reply smaller than sizeof(struct get_dfs_referral_rsp)\n- reply with number of referrals smaller than NumberOfReferrals in the\nheader\n\nProcessing of such replies will cause oob.\n\nReturn -EINVAL error on such replies to prevent oob-s.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40099",
"url": "https://www.suse.com/security/cve/CVE-2025-40099"
},
{
"category": "external",
"summary": "SUSE Bug 1252911 for CVE-2025-40099",
"url": "https://bugzilla.suse.com/1252911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-40099"
},
{
"cve": "CVE-2025-40103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40103"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: Fix refcount leak for cifs_sb_tlink\n\nFix three refcount inconsistency issues related to `cifs_sb_tlink`.\n\nComments for `cifs_sb_tlink` state that `cifs_put_tlink()` needs to be\ncalled after successful calls to `cifs_sb_tlink()`. Three calls fail to\nupdate refcount accordingly, leading to possible resource leaks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40103",
"url": "https://www.suse.com/security/cve/CVE-2025-40103"
},
{
"category": "external",
"summary": "SUSE Bug 1252924 for CVE-2025-40103",
"url": "https://bugzilla.suse.com/1252924"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "low"
}
],
"title": "CVE-2025-40103"
},
{
"cve": "CVE-2025-40253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/ctcm: Fix double-kfree\n\nThe function \u0027mpc_rcvd_sweep_req(mpcginfo)\u0027 is called conditionally\nfrom function \u0027ctcmpc_unpack_skb\u0027. It frees passed mpcginfo.\nAfter that a call to function \u0027kfree\u0027 in function \u0027ctcmpc_unpack_skb\u0027\nfrees it again.\n\nRemove \u0027kfree\u0027 call in function \u0027mpc_rcvd_sweep_req(mpcginfo)\u0027.\n\nBug detected by the clang static analyzer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40253",
"url": "https://www.suse.com/security/cve/CVE-2025-40253"
},
{
"category": "external",
"summary": "SUSE Bug 1255084 for CVE-2025-40253",
"url": "https://bugzilla.suse.com/1255084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-40253"
},
{
"cve": "CVE-2025-71066",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71066"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: ets: Always remove class from active list before deleting in ets_qdisc_change\n\nzdi-disclosures@trendmicro.com says:\n\nThe vulnerability is a race condition between `ets_qdisc_dequeue` and\n`ets_qdisc_change`. It leads to UAF on `struct Qdisc` object.\nAttacker requires the capability to create new user and network namespace\nin order to trigger the bug.\nSee my additional commentary at the end of the analysis.\n\nAnalysis:\n\nstatic int ets_qdisc_change(struct Qdisc *sch, struct nlattr *opt,\n struct netlink_ext_ack *extack)\n{\n...\n\n // (1) this lock is preventing .change handler (`ets_qdisc_change`)\n //to race with .dequeue handler (`ets_qdisc_dequeue`)\n sch_tree_lock(sch);\n\n for (i = nbands; i \u003c oldbands; i++) {\n if (i \u003e= q-\u003enstrict \u0026\u0026 q-\u003eclasses[i].qdisc-\u003eq.qlen)\n list_del_init(\u0026q-\u003eclasses[i].alist);\n qdisc_purge_queue(q-\u003eclasses[i].qdisc);\n }\n\n WRITE_ONCE(q-\u003enbands, nbands);\n for (i = nstrict; i \u003c q-\u003enstrict; i++) {\n if (q-\u003eclasses[i].qdisc-\u003eq.qlen) {\n\t\t // (2) the class is added to the q-\u003eactive\n list_add_tail(\u0026q-\u003eclasses[i].alist, \u0026q-\u003eactive);\n q-\u003eclasses[i].deficit = quanta[i];\n }\n }\n WRITE_ONCE(q-\u003enstrict, nstrict);\n memcpy(q-\u003eprio2band, priomap, sizeof(priomap));\n\n for (i = 0; i \u003c q-\u003enbands; i++)\n WRITE_ONCE(q-\u003eclasses[i].quantum, quanta[i]);\n\n for (i = oldbands; i \u003c q-\u003enbands; i++) {\n q-\u003eclasses[i].qdisc = queues[i];\n if (q-\u003eclasses[i].qdisc != \u0026noop_qdisc)\n qdisc_hash_add(q-\u003eclasses[i].qdisc, true);\n }\n\n // (3) the qdisc is unlocked, now dequeue can be called in parallel\n // to the rest of .change handler\n sch_tree_unlock(sch);\n\n ets_offload_change(sch);\n for (i = q-\u003enbands; i \u003c oldbands; i++) {\n\t // (4) we\u0027re reducing the refcount for our class\u0027s qdisc and\n\t // freeing it\n qdisc_put(q-\u003eclasses[i].qdisc);\n\t // (5) If we call .dequeue between (4) and (5), we will have\n\t // a strong UAF and we can control RIP\n q-\u003eclasses[i].qdisc = NULL;\n WRITE_ONCE(q-\u003eclasses[i].quantum, 0);\n q-\u003eclasses[i].deficit = 0;\n gnet_stats_basic_sync_init(\u0026q-\u003eclasses[i].bstats);\n memset(\u0026q-\u003eclasses[i].qstats, 0, sizeof(q-\u003eclasses[i].qstats));\n }\n return 0;\n}\n\nComment:\nThis happens because some of the classes have their qdiscs assigned to\nNULL, but remain in the active list. This commit fixes this issue by always\nremoving the class from the active list before deleting and freeing its\nassociated qdisc\n\nReproducer Steps\n(trimmed version of what was sent by zdi-disclosures@trendmicro.com)\n\n```\nDEV=\"${DEV:-lo}\"\nROOT_HANDLE=\"${ROOT_HANDLE:-1:}\"\nBAND2_HANDLE=\"${BAND2_HANDLE:-20:}\" # child under 1:2\nPING_BYTES=\"${PING_BYTES:-48}\"\nPING_COUNT=\"${PING_COUNT:-200000}\"\nPING_DST=\"${PING_DST:-127.0.0.1}\"\n\nSLOW_TBF_RATE=\"${SLOW_TBF_RATE:-8bit}\"\nSLOW_TBF_BURST=\"${SLOW_TBF_BURST:-100b}\"\nSLOW_TBF_LAT=\"${SLOW_TBF_LAT:-1s}\"\n\ncleanup() {\n tc qdisc del dev \"$DEV\" root 2\u003e/dev/null\n}\ntrap cleanup EXIT\n\nip link set \"$DEV\" up\n\ntc qdisc del dev \"$DEV\" root 2\u003e/dev/null || true\n\ntc qdisc add dev \"$DEV\" root handle \"$ROOT_HANDLE\" ets bands 2 strict 2\n\ntc qdisc add dev \"$DEV\" parent 1:2 handle \"$BAND2_HANDLE\" \\\n tbf rate \"$SLOW_TBF_RATE\" burst \"$SLOW_TBF_BURST\" latency \"$SLOW_TBF_LAT\"\n\ntc filter add dev \"$DEV\" parent 1: protocol all prio 1 u32 match u32 0 0 flowid 1:2\ntc -s qdisc ls dev $DEV\n\nping -I \"$DEV\" -f -c \"$PING_COUNT\" -s \"$PING_BYTES\" -W 0.001 \"$PING_DST\" \\\n \u003e/dev/null 2\u003e\u00261 \u0026\ntc qdisc change dev \"$DEV\" root handle \"$ROOT_HANDLE\" ets bands 2 strict 0\ntc qdisc change dev \"$DEV\" root handle \"$ROOT_HANDLE\" ets bands 2 strict 2\ntc -s qdisc ls dev $DEV\ntc qdisc del dev \"$DEV\" parent \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71066",
"url": "https://www.suse.com/security/cve/CVE-2025-71066"
},
{
"category": "external",
"summary": "SUSE Bug 1256645 for CVE-2025-71066",
"url": "https://bugzilla.suse.com/1256645"
},
{
"category": "external",
"summary": "SUSE Bug 1258005 for CVE-2025-71066",
"url": "https://bugzilla.suse.com/1258005"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "important"
}
],
"title": "CVE-2025-71066"
},
{
"cve": "CVE-2025-71113",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71113"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: af_alg - zero initialize memory allocated via sock_kmalloc\n\nSeveral crypto user API contexts and requests allocated with\nsock_kmalloc() were left uninitialized, relying on callers to\nset fields explicitly. This resulted in the use of uninitialized\ndata in certain error paths or when new fields are added in the\nfuture.\n\nThe ACVP patches also contain two user-space interface files:\nalgif_kpp.c and algif_akcipher.c. These too rely on proper\ninitialization of their context structures.\n\nA particular issue has been observed with the newly added\n\u0027inflight\u0027 variable introduced in af_alg_ctx by commit:\n\n 67b164a871af (\"crypto: af_alg - Disallow multiple in-flight AIO requests\")\n\nBecause the context is not memset to zero after allocation,\nthe inflight variable has contained garbage values. As a result,\naf_alg_alloc_areq() has incorrectly returned -EBUSY randomly when\nthe garbage value was interpreted as true:\n\n https://github.com/gregkh/linux/blame/master/crypto/af_alg.c#L1209\n\nThe check directly tests ctx-\u003einflight without explicitly\ncomparing against true/false. Since inflight is only ever set to\ntrue or false later, an uninitialized value has triggered\n-EBUSY failures. Zero-initializing memory allocated with\nsock_kmalloc() ensures inflight and other fields start in a known\nstate, removing random issues caused by uninitialized data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71113",
"url": "https://www.suse.com/security/cve/CVE-2025-71113"
},
{
"category": "external",
"summary": "SUSE Bug 1256716 for CVE-2025-71113",
"url": "https://bugzilla.suse.com/1256716"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "moderate"
}
],
"title": "CVE-2025-71113"
},
{
"cve": "CVE-2025-71231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71231"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode\n\nThe local variable \u0027i\u0027 is initialized with -EINVAL, but the for loop\nimmediately overwrites it and -EINVAL is never returned.\n\nIf no empty compression mode can be found, the function would return the\nout-of-bounds index IAA_COMP_MODES_MAX, which would cause an invalid\narray access in add_iaa_compression_mode().\n\nFix both issues by returning either a valid index or -EINVAL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71231",
"url": "https://www.suse.com/security/cve/CVE-2025-71231"
},
{
"category": "external",
"summary": "SUSE Bug 1258424 for CVE-2025-71231",
"url": "https://bugzilla.suse.com/1258424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "important"
}
],
"title": "CVE-2025-71231"
},
{
"cve": "CVE-2026-23004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23004"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndst: fix races in rt6_uncached_list_del() and rt_del_uncached_list()\n\nsyzbot was able to crash the kernel in rt6_uncached_list_flush_dev()\nin an interesting way [1]\n\nCrash happens in list_del_init()/INIT_LIST_HEAD() while writing\nlist-\u003eprev, while the prior write on list-\u003enext went well.\n\nstatic inline void INIT_LIST_HEAD(struct list_head *list)\n{\n\tWRITE_ONCE(list-\u003enext, list); // This went well\n\tWRITE_ONCE(list-\u003eprev, list); // Crash, @list has been freed.\n}\n\nIssue here is that rt6_uncached_list_del() did not attempt to lock\nul-\u003elock, as list_empty(\u0026rt-\u003edst.rt_uncached) returned\ntrue because the WRITE_ONCE(list-\u003enext, list) happened on the other CPU.\n\nWe might use list_del_init_careful() and list_empty_careful(),\nor make sure rt6_uncached_list_del() always grabs the spinlock\nwhenever rt-\u003edst.rt_uncached_list has been set.\n\nA similar fix is neeed for IPv4.\n\n[1]\n\n BUG: KASAN: slab-use-after-free in INIT_LIST_HEAD include/linux/list.h:46 [inline]\n BUG: KASAN: slab-use-after-free in list_del_init include/linux/list.h:296 [inline]\n BUG: KASAN: slab-use-after-free in rt6_uncached_list_flush_dev net/ipv6/route.c:191 [inline]\n BUG: KASAN: slab-use-after-free in rt6_disable_ip+0x633/0x730 net/ipv6/route.c:5020\nWrite of size 8 at addr ffff8880294cfa78 by task kworker/u8:14/3450\n\nCPU: 0 UID: 0 PID: 3450 Comm: kworker/u8:14 Tainted: G L syzkaller #0 PREEMPT_{RT,(full)}\nTainted: [L]=SOFTLOCKUP\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025\nWorkqueue: netns cleanup_net\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n INIT_LIST_HEAD include/linux/list.h:46 [inline]\n list_del_init include/linux/list.h:296 [inline]\n rt6_uncached_list_flush_dev net/ipv6/route.c:191 [inline]\n rt6_disable_ip+0x633/0x730 net/ipv6/route.c:5020\n addrconf_ifdown+0x143/0x18a0 net/ipv6/addrconf.c:3853\n addrconf_notify+0x1bc/0x1050 net/ipv6/addrconf.c:-1\n notifier_call_chain+0x19d/0x3a0 kernel/notifier.c:85\n call_netdevice_notifiers_extack net/core/dev.c:2268 [inline]\n call_netdevice_notifiers net/core/dev.c:2282 [inline]\n netif_close_many+0x29c/0x410 net/core/dev.c:1785\n unregister_netdevice_many_notify+0xb50/0x2330 net/core/dev.c:12353\n ops_exit_rtnl_list net/core/net_namespace.c:187 [inline]\n ops_undo_list+0x3dc/0x990 net/core/net_namespace.c:248\n cleanup_net+0x4de/0x7b0 net/core/net_namespace.c:696\n process_one_work kernel/workqueue.c:3257 [inline]\n process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421\n kthread+0x711/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246\n \u003c/TASK\u003e\n\nAllocated by task 803:\n kasan_save_stack mm/kasan/common.c:57 [inline]\n kasan_save_track+0x3e/0x80 mm/kasan/common.c:78\n unpoison_slab_object mm/kasan/common.c:340 [inline]\n __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:366\n kasan_slab_alloc include/linux/kasan.h:253 [inline]\n slab_post_alloc_hook mm/slub.c:4953 [inline]\n slab_alloc_node mm/slub.c:5263 [inline]\n kmem_cache_alloc_noprof+0x18d/0x6c0 mm/slub.c:5270\n dst_alloc+0x105/0x170 net/core/dst.c:89\n ip6_dst_alloc net/ipv6/route.c:342 [inline]\n icmp6_dst_alloc+0x75/0x460 net/ipv6/route.c:3333\n mld_sendpack+0x683/0xe60 net/ipv6/mcast.c:1844\n mld_send_cr net/ipv6/mcast.c:2154 [inline]\n mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693\n process_one_work kernel/workqueue.c:3257 [inline]\n process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421\n kthread+0x711/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entr\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23004",
"url": "https://www.suse.com/security/cve/CVE-2026-23004"
},
{
"category": "external",
"summary": "SUSE Bug 1257231 for CVE-2026-23004",
"url": "https://bugzilla.suse.com/1257231"
},
{
"category": "external",
"summary": "SUSE Bug 1258655 for CVE-2026-23004",
"url": "https://bugzilla.suse.com/1258655"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "important"
}
],
"title": "CVE-2026-23004"
},
{
"cve": "CVE-2026-23054",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23054"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hv_netvsc: reject RSS hash key programming without RX indirection table\n\nRSS configuration requires a valid RX indirection table. When the device\nreports a single receive queue, rndis_filter_device_add() does not\nallocate an indirection table, accepting RSS hash key updates in this\nstate leads to a hang.\n\nFix this by gating netvsc_set_rxfh() on ndc-\u003erx_table_sz and return\n-EOPNOTSUPP when the table is absent. This aligns set_rxfh with the device\ncapabilities and prevents incorrect behavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23054",
"url": "https://www.suse.com/security/cve/CVE-2026-23054"
},
{
"category": "external",
"summary": "SUSE Bug 1257732 for CVE-2026-23054",
"url": "https://bugzilla.suse.com/1257732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "moderate"
}
],
"title": "CVE-2026-23054"
},
{
"cve": "CVE-2026-23060",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23060"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: authencesn - reject too-short AAD (assoclen\u003c8) to match ESP/ESN spec\n\nauthencesn assumes an ESP/ESN-formatted AAD. When assoclen is shorter than\nthe minimum expected length, crypto_authenc_esn_decrypt() can advance past\nthe end of the destination scatterlist and trigger a NULL pointer dereference\nin scatterwalk_map_and_copy(), leading to a kernel panic (DoS).\n\nAdd a minimum AAD length check to fail fast on invalid inputs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23060",
"url": "https://www.suse.com/security/cve/CVE-2026-23060"
},
{
"category": "external",
"summary": "SUSE Bug 1257735 for CVE-2026-23060",
"url": "https://bugzilla.suse.com/1257735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "moderate"
}
],
"title": "CVE-2026-23060"
},
{
"cve": "CVE-2026-23074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23074"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Enforce that teql can only be used as root qdisc\n\nDesign intent of teql is that it is only supposed to be used as root qdisc.\nWe need to check for that constraint.\n\nAlthough not important, I will describe the scenario that unearthed this\nissue for the curious.\n\nGangMin Kim \u003ckm.kim1503@gmail.com\u003e managed to concot a scenario as follows:\n\nROOT qdisc 1:0 (QFQ)\n \u251c\u2500\u2500 class 1:1 (weight=15, lmax=16384) netem with delay 6.4s\n \u2500\u2500 class 1:2 (weight=1, lmax=1514) teql\n\nGangMin sends a packet which is enqueued to 1:1 (netem).\nAny invocation of dequeue by QFQ from this class will not return a packet\nuntil after 6.4s. In the meantime, a second packet is sent and it lands on\n1:2. teql\u0027s enqueue will return success and this will activate class 1:2.\nMain issue is that teql only updates the parent visible qlen (sch-\u003eq.qlen)\nat dequeue. Since QFQ will only call dequeue if peek succeeds (and teql\u0027s\npeek always returns NULL), dequeue will never be called and thus the qlen\nwill remain as 0. With that in mind, when GangMin updates 1:2\u0027s lmax value,\nthe qfq_change_class calls qfq_deact_rm_from_agg. Since the child qdisc\u0027s\nqlen was not incremented, qfq fails to deactivate the class, but still\nfrees its pointers from the aggregate. So when the first packet is\nrescheduled after 6.4 seconds (netem\u0027s delay), a dangling pointer is\naccessed causing GangMin\u0027s causing a UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23074",
"url": "https://www.suse.com/security/cve/CVE-2026-23074"
},
{
"category": "external",
"summary": "SUSE Bug 1257749 for CVE-2026-23074",
"url": "https://bugzilla.suse.com/1257749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "important"
}
],
"title": "CVE-2026-23074"
},
{
"cve": "CVE-2026-23089",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23089"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free()\n\nWhen snd_usb_create_mixer() fails, snd_usb_mixer_free() frees\nmixer-\u003eid_elems but the controls already added to the card still\nreference the freed memory. Later when snd_card_register() runs,\nthe OSS mixer layer calls their callbacks and hits a use-after-free read.\n\nCall trace:\n get_ctl_value+0x63f/0x820 sound/usb/mixer.c:411\n get_min_max_with_quirks.isra.0+0x240/0x1f40 sound/usb/mixer.c:1241\n mixer_ctl_feature_info+0x26b/0x490 sound/usb/mixer.c:1381\n snd_mixer_oss_build_test+0x174/0x3a0 sound/core/oss/mixer_oss.c:887\n ...\n snd_card_register+0x4ed/0x6d0 sound/core/init.c:923\n usb_audio_probe+0x5ef/0x2a90 sound/usb/card.c:1025\n\nFix by calling snd_ctl_remove() for all mixer controls before freeing\nid_elems. We save the next pointer first because snd_ctl_remove()\nfrees the current element.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23089",
"url": "https://www.suse.com/security/cve/CVE-2026-23089"
},
{
"category": "external",
"summary": "SUSE Bug 1257790 for CVE-2026-23089",
"url": "https://bugzilla.suse.com/1257790"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "moderate"
}
],
"title": "CVE-2026-23089"
},
{
"cve": "CVE-2026-23111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23111"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()\n\nnft_map_catchall_activate() has an inverted element activity check\ncompared to its non-catchall counterpart nft_mapelem_activate() and\ncompared to what is logically required.\n\nnft_map_catchall_activate() is called from the abort path to re-activate\ncatchall map elements that were deactivated during a failed transaction.\nIt should skip elements that are already active (they don\u0027t need\nre-activation) and process elements that are inactive (they need to be\nrestored). Instead, the current code does the opposite: it skips inactive\nelements and processes active ones.\n\nCompare the non-catchall activate callback, which is correct:\n\n nft_mapelem_activate():\n if (nft_set_elem_active(ext, iter-\u003egenmask))\n return 0; /* skip active, process inactive */\n\nWith the buggy catchall version:\n\n nft_map_catchall_activate():\n if (!nft_set_elem_active(ext, genmask))\n continue; /* skip inactive, process active */\n\nThe consequence is that when a DELSET operation is aborted,\nnft_setelem_data_activate() is never called for the catchall element.\nFor NFT_GOTO verdict elements, this means nft_data_hold() is never\ncalled to restore the chain-\u003euse reference count. Each abort cycle\npermanently decrements chain-\u003euse. Once chain-\u003euse reaches zero,\nDELCHAIN succeeds and frees the chain while catchall verdict elements\nstill reference it, resulting in a use-after-free.\n\nThis is exploitable for local privilege escalation from an unprivileged\nuser via user namespaces + nftables on distributions that enable\nCONFIG_USER_NS and CONFIG_NF_TABLES.\n\nFix by removing the negation so the check matches nft_mapelem_activate():\nskip active elements, process inactive ones.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23111",
"url": "https://www.suse.com/security/cve/CVE-2026-23111"
},
{
"category": "external",
"summary": "SUSE Bug 1258181 for CVE-2026-23111",
"url": "https://bugzilla.suse.com/1258181"
},
{
"category": "external",
"summary": "SUSE Bug 1258183 for CVE-2026-23111",
"url": "https://bugzilla.suse.com/1258183"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "important"
}
],
"title": "CVE-2026-23111"
},
{
"cve": "CVE-2026-23141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23141"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: send: check for inline extents in range_is_hole_in_parent()\n\nBefore accessing the disk_bytenr field of a file extent item we need\nto check if we are dealing with an inline extent.\nThis is because for inline extents their data starts at the offset of\nthe disk_bytenr field. So accessing the disk_bytenr\nmeans we are accessing inline data or in case the inline data is less\nthan 8 bytes we can actually cause an invalid\nmemory access if this inline extent item is the first item in the leaf\nor access metadata from other items.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23141",
"url": "https://www.suse.com/security/cve/CVE-2026-23141"
},
{
"category": "external",
"summary": "SUSE Bug 1258377 for CVE-2026-23141",
"url": "https://bugzilla.suse.com/1258377"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "moderate"
}
],
"title": "CVE-2026-23141"
},
{
"cve": "CVE-2026-23157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23157"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not strictly require dirty metadata threshold for metadata writepages\n\n[BUG]\nThere is an internal report that over 1000 processes are\nwaiting at the io_schedule_timeout() of balance_dirty_pages(), causing\na system hang and trigger a kernel coredump.\n\nThe kernel is v6.4 kernel based, but the root problem still applies to\nany upstream kernel before v6.18.\n\n[CAUSE]\nFrom Jan Kara for his wisdom on the dirty page balance behavior first.\n\n This cgroup dirty limit was what was actually playing the role here\n because the cgroup had only a small amount of memory and so the dirty\n limit for it was something like 16MB.\n\n Dirty throttling is responsible for enforcing that nobody can dirty\n (significantly) more dirty memory than there\u0027s dirty limit. Thus when\n a task is dirtying pages it periodically enters into balance_dirty_pages()\n and we let it sleep there to slow down the dirtying.\n\n When the system is over dirty limit already (either globally or within\n a cgroup of the running task), we will not let the task exit from\n balance_dirty_pages() until the number of dirty pages drops below the\n limit.\n\n So in this particular case, as I already mentioned, there was a cgroup\n with relatively small amount of memory and as a result with dirty limit\n set at 16MB. A task from that cgroup has dirtied about 28MB worth of\n pages in btrfs btree inode and these were practically the only dirty\n pages in that cgroup.\n\nSo that means the only way to reduce the dirty pages of that cgroup is\nto writeback the dirty pages of btrfs btree inode, and only after that\nthose processes can exit balance_dirty_pages().\n\nNow back to the btrfs part, btree_writepages() is responsible for\nwriting back dirty btree inode pages.\n\nThe problem here is, there is a btrfs internal threshold that if the\nbtree inode\u0027s dirty bytes are below the 32M threshold, it will not\ndo any writeback.\n\nThis behavior is to batch as much metadata as possible so we won\u0027t write\nback those tree blocks and then later re-COW them again for another\nmodification.\n\nThis internal 32MiB is higher than the existing dirty page size (28MiB),\nmeaning no writeback will happen, causing a deadlock between btrfs and\ncgroup:\n\n- Btrfs doesn\u0027t want to write back btree inode until more dirty pages\n\n- Cgroup/MM doesn\u0027t want more dirty pages for btrfs btree inode\n Thus any process touching that btree inode is put into sleep until\n the number of dirty pages is reduced.\n\nThanks Jan Kara a lot for the analysis of the root cause.\n\n[ENHANCEMENT]\nSince kernel commit b55102826d7d (\"btrfs: set AS_KERNEL_FILE on the\nbtree_inode\"), btrfs btree inode pages will only be charged to the root\ncgroup which should have a much larger limit than btrfs\u0027 32MiB\nthreshold.\nSo it should not affect newer kernels.\n\nBut for all current LTS kernels, they are all affected by this problem,\nand backporting the whole AS_KERNEL_FILE may not be a good idea.\n\nEven for newer kernels I still think it\u0027s a good idea to get\nrid of the internal threshold at btree_writepages(), since for most cases\ncgroup/MM has a better view of full system memory usage than btrfs\u0027 fixed\nthreshold.\n\nFor internal callers using btrfs_btree_balance_dirty() since that\nfunction is already doing internal threshold check, we don\u0027t need to\nbother them.\n\nBut for external callers of btree_writepages(), just respect their\nrequests and write back whatever they want, ignoring the internal\nbtrfs threshold to avoid such deadlock on btree inode dirty page\nbalancing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23157",
"url": "https://www.suse.com/security/cve/CVE-2026-23157"
},
{
"category": "external",
"summary": "SUSE Bug 1258376 for CVE-2026-23157",
"url": "https://bugzilla.suse.com/1258376"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "moderate"
}
],
"title": "CVE-2026-23157"
},
{
"cve": "CVE-2026-23191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23191"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: aloop: Fix racy access at PCM trigger\n\nThe PCM trigger callback of aloop driver tries to check the PCM state\nand stop the stream of the tied substream in the corresponding cable.\nSince both check and stop operations are performed outside the cable\nlock, this may result in UAF when a program attempts to trigger\nfrequently while opening/closing the tied stream, as spotted by\nfuzzers.\n\nFor addressing the UAF, this patch changes two things:\n- It covers the most of code in loopback_check_format() with\n cable-\u003elock spinlock, and add the proper NULL checks. This avoids\n already some racy accesses.\n- In addition, now we try to check the state of the capture PCM stream\n that may be stopped in this function, which was the major pain point\n leading to UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23191",
"url": "https://www.suse.com/security/cve/CVE-2026-23191"
},
{
"category": "external",
"summary": "SUSE Bug 1258395 for CVE-2026-23191",
"url": "https://bugzilla.suse.com/1258395"
},
{
"category": "external",
"summary": "SUSE Bug 1258396 for CVE-2026-23191",
"url": "https://bugzilla.suse.com/1258396"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "important"
}
],
"title": "CVE-2026-23191"
},
{
"cve": "CVE-2026-23202",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23202"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer\n\nThe curr_xfer field is read by the IRQ handler without holding the lock\nto check if a transfer is in progress. When clearing curr_xfer in the\ncombined sequence transfer loop, protect it with the spinlock to prevent\na race with the interrupt handler.\n\nProtect the curr_xfer clearing at the exit path of\ntegra_qspi_combined_seq_xfer() with the spinlock to prevent a race\nwith the interrupt handler that reads this field.\n\nWithout this protection, the IRQ handler could read a partially updated\ncurr_xfer value, leading to NULL pointer dereference or use-after-free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23202",
"url": "https://www.suse.com/security/cve/CVE-2026-23202"
},
{
"category": "external",
"summary": "SUSE Bug 1258338 for CVE-2026-23202",
"url": "https://bugzilla.suse.com/1258338"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "important"
}
],
"title": "CVE-2026-23202"
},
{
"cve": "CVE-2026-23204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: cls_u32: use skb_header_pointer_careful()\n\nskb_header_pointer() does not fully validate negative @offset values.\n\nUse skb_header_pointer_careful() instead.\n\nGangMin Kim provided a report and a repro fooling u32_classify():\n\nBUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0\nnet/sched/cls_u32.c:221",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23204",
"url": "https://www.suse.com/security/cve/CVE-2026-23204"
},
{
"category": "external",
"summary": "SUSE Bug 1258340 for CVE-2026-23204",
"url": "https://bugzilla.suse.com/1258340"
},
{
"category": "external",
"summary": "SUSE Bug 1259126 for CVE-2026-23204",
"url": "https://bugzilla.suse.com/1259126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "important"
}
],
"title": "CVE-2026-23204"
},
{
"cve": "CVE-2026-23207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23207"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: tegra210-quad: Protect curr_xfer check in IRQ handler\n\nNow that all other accesses to curr_xfer are done under the lock,\nprotect the curr_xfer NULL check in tegra_qspi_isr_thread() with the\nspinlock. Without this protection, the following race can occur:\n\n CPU0 (ISR thread) CPU1 (timeout path)\n ---------------- -------------------\n if (!tqspi-\u003ecurr_xfer)\n // sees non-NULL\n spin_lock()\n tqspi-\u003ecurr_xfer = NULL\n spin_unlock()\n handle_*_xfer()\n spin_lock()\n t = tqspi-\u003ecurr_xfer // NULL!\n ... t-\u003elen ... // NULL dereference!\n\nWith this patch, all curr_xfer accesses are now properly synchronized.\n\nAlthough all accesses to curr_xfer are done under the lock, in\ntegra_qspi_isr_thread() it checks for NULL, releases the lock and\nreacquires it later in handle_cpu_based_xfer()/handle_dma_based_xfer().\nThere is a potential for an update in between, which could cause a NULL\npointer dereference.\n\nTo handle this, add a NULL check inside the handlers after acquiring\nthe lock. This ensures that if the timeout path has already cleared\ncurr_xfer, the handler will safely return without dereferencing the\nNULL pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23207",
"url": "https://www.suse.com/security/cve/CVE-2026-23207"
},
{
"category": "external",
"summary": "SUSE Bug 1258524 for CVE-2026-23207",
"url": "https://bugzilla.suse.com/1258524"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "moderate"
}
],
"title": "CVE-2026-23207"
},
{
"cve": "CVE-2026-23209",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23209"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmacvlan: fix error recovery in macvlan_common_newlink()\n\nvalis provided a nice repro to crash the kernel:\n\nip link add p1 type veth peer p2\nip link set address 00:00:00:00:00:20 dev p1\nip link set up dev p1\nip link set up dev p2\n\nip link add mv0 link p2 type macvlan mode source\nip link add invalid% link p2 type macvlan mode source macaddr add 00:00:00:00:00:20\n\nping -c1 -I p1 1.2.3.4\n\nHe also gave a very detailed analysis:\n\n\u003cquote valis\u003e\n\nThe issue is triggered when a new macvlan link is created with\nMACVLAN_MODE_SOURCE mode and MACVLAN_MACADDR_ADD (or\nMACVLAN_MACADDR_SET) parameter, lower device already has a macvlan\nport and register_netdevice() called from macvlan_common_newlink()\nfails (e.g. because of the invalid link name).\n\nIn this case macvlan_hash_add_source is called from\nmacvlan_change_sources() / macvlan_common_newlink():\n\nThis adds a reference to vlan to the port\u0027s vlan_source_hash using\nmacvlan_source_entry.\n\nvlan is a pointer to the priv data of the link that is being created.\n\nWhen register_netdevice() fails, the error is returned from\nmacvlan_newlink() to rtnl_newlink_create():\n\n if (ops-\u003enewlink)\n err = ops-\u003enewlink(dev, \u0026params, extack);\n else\n err = register_netdevice(dev);\n if (err \u003c 0) {\n free_netdev(dev);\n goto out;\n }\n\nand free_netdev() is called, causing a kvfree() on the struct\nnet_device that is still referenced in the source entry attached to\nthe lower device\u0027s macvlan port.\n\nNow all packets sent on the macvlan port with a matching source mac\naddress will trigger a use-after-free in macvlan_forward_source().\n\n\u003c/quote valis\u003e\n\nWith all that, my fix is to make sure we call macvlan_flush_sources()\nregardless of @create value whenever \"goto destroy_macvlan_port;\"\npath is taken.\n\nMany thanks to valis for following up on this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23209",
"url": "https://www.suse.com/security/cve/CVE-2026-23209"
},
{
"category": "external",
"summary": "SUSE Bug 1258518 for CVE-2026-23209",
"url": "https://bugzilla.suse.com/1258518"
},
{
"category": "external",
"summary": "SUSE Bug 1258784 for CVE-2026-23209",
"url": "https://bugzilla.suse.com/1258784"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "important"
}
],
"title": "CVE-2026-23209"
},
{
"cve": "CVE-2026-23214",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23214"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: reject new transactions if the fs is fully read-only\n\n[BUG]\nThere is a bug report where a heavily fuzzed fs is mounted with all\nrescue mount options, which leads to the following warnings during\nunmount:\n\n BTRFS: Transaction aborted (error -22)\n Modules linked in:\n CPU: 0 UID: 0 PID: 9758 Comm: repro.out Not tainted\n 6.19.0-rc5-00002-gb71e635feefc #7 PREEMPT(full)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n RIP: 0010:find_free_extent_update_loop fs/btrfs/extent-tree.c:4208 [inline]\n RIP: 0010:find_free_extent+0x52f0/0x5d20 fs/btrfs/extent-tree.c:4611\n Call Trace:\n \u003cTASK\u003e\n btrfs_reserve_extent+0x2cd/0x790 fs/btrfs/extent-tree.c:4705\n btrfs_alloc_tree_block+0x1e1/0x10e0 fs/btrfs/extent-tree.c:5157\n btrfs_force_cow_block+0x578/0x2410 fs/btrfs/ctree.c:517\n btrfs_cow_block+0x3c4/0xa80 fs/btrfs/ctree.c:708\n btrfs_search_slot+0xcad/0x2b50 fs/btrfs/ctree.c:2130\n btrfs_truncate_inode_items+0x45d/0x2350 fs/btrfs/inode-item.c:499\n btrfs_evict_inode+0x923/0xe70 fs/btrfs/inode.c:5628\n evict+0x5f4/0xae0 fs/inode.c:837\n __dentry_kill+0x209/0x660 fs/dcache.c:670\n finish_dput+0xc9/0x480 fs/dcache.c:879\n shrink_dcache_for_umount+0xa0/0x170 fs/dcache.c:1661\n generic_shutdown_super+0x67/0x2c0 fs/super.c:621\n kill_anon_super+0x3b/0x70 fs/super.c:1289\n btrfs_kill_super+0x41/0x50 fs/btrfs/super.c:2127\n deactivate_locked_super+0xbc/0x130 fs/super.c:474\n cleanup_mnt+0x425/0x4c0 fs/namespace.c:1318\n task_work_run+0x1d4/0x260 kernel/task_work.c:233\n exit_task_work include/linux/task_work.h:40 [inline]\n do_exit+0x694/0x22f0 kernel/exit.c:971\n do_group_exit+0x21c/0x2d0 kernel/exit.c:1112\n __do_sys_exit_group kernel/exit.c:1123 [inline]\n __se_sys_exit_group kernel/exit.c:1121 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1121\n x64_sys_call+0x2210/0x2210 arch/x86/include/generated/asm/syscalls_64.h:232\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xe8/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n RIP: 0033:0x44f639\n Code: Unable to access opcode bytes at 0x44f60f.\n RSP: 002b:00007ffc15c4e088 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\n RAX: ffffffffffffffda RBX: 00000000004c32f0 RCX: 000000000044f639\n RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001\n RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004c32f0\n R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001\n \u003c/TASK\u003e\n\nSince rescue mount options will mark the full fs read-only, there should\nbe no new transaction triggered.\n\nBut during unmount we will evict all inodes, which can trigger a new\ntransaction, and triggers warnings on a heavily corrupted fs.\n\n[CAUSE]\nBtrfs allows new transaction even on a read-only fs, this is to allow\nlog replay happen even on read-only mounts, just like what ext4/xfs do.\n\nHowever with rescue mount options, the fs is fully read-only and cannot\nbe remounted read-write, thus in that case we should also reject any new\ntransactions.\n\n[FIX]\nIf we find the fs has rescue mount options, we should treat the fs as\nerror, so that no new transaction can be started.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23214",
"url": "https://www.suse.com/security/cve/CVE-2026-23214"
},
{
"category": "external",
"summary": "SUSE Bug 1258464 for CVE-2026-23214",
"url": "https://bugzilla.suse.com/1258464"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "moderate"
}
],
"title": "CVE-2026-23214"
},
{
"cve": "CVE-2026-23268",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23268"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: fix unprivileged local user can do privileged policy management\n\nAn unprivileged local user can load, replace, and remove profiles by\nopening the apparmorfs interfaces, via a confused deputy attack, by\npassing the opened fd to a privileged process, and getting the\nprivileged process to write to the interface.\n\nThis does require a privileged target that can be manipulated to do\nthe write for the unprivileged process, but once such access is\nachieved full policy management is possible and all the possible\nimplications that implies: removing confinement, DoS of system or\ntarget applications by denying all execution, by-passing the\nunprivileged user namespace restriction, to exploiting kernel bugs for\na local privilege escalation.\n\nThe policy management interface can not have its permissions simply\nchanged from 0666 to 0600 because non-root processes need to be able\nto load policy to different policy namespaces.\n\nInstead ensure the task writing the interface has privileges that\nare a subset of the task that opened the interface. This is already\ndone via policy for confined processes, but unconfined can delegate\naccess to the opened fd, by-passing the usual policy check.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23268",
"url": "https://www.suse.com/security/cve/CVE-2026-23268"
},
{
"category": "external",
"summary": "SUSE Bug 1258850 for CVE-2026-23268",
"url": "https://bugzilla.suse.com/1258850"
},
{
"category": "external",
"summary": "SUSE Bug 1259859 for CVE-2026-23268",
"url": "https://bugzilla.suse.com/1259859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "important"
}
],
"title": "CVE-2026-23268"
},
{
"cve": "CVE-2026-23269",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23269"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\napparmor: validate DFA start states are in bounds in unpack_pdb\n\nStart states are read from untrusted data and used as indexes into the\nDFA state tables. The aa_dfa_next() function call in unpack_pdb() will\naccess dfa-\u003etables[YYTD_ID_BASE][start], and if the start state exceeds\nthe number of states in the DFA, this results in an out-of-bound read.\n\n==================================================================\n BUG: KASAN: slab-out-of-bounds in aa_dfa_next+0x2a1/0x360\n Read of size 4 at addr ffff88811956fb90 by task su/1097\n ...\n\nReject policies with out-of-bounds start states during unpacking\nto prevent the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23269",
"url": "https://www.suse.com/security/cve/CVE-2026-23269"
},
{
"category": "external",
"summary": "SUSE Bug 1259857 for CVE-2026-23269",
"url": "https://bugzilla.suse.com/1259857"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_92-default-1-150600.13.5.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.92.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.92.1.150600.12.42.2.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.92.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.92.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-25T14:13:20Z",
"details": "moderate"
}
],
"title": "CVE-2026-23269"
}
]
}
FKIE_CVE-2024-38542
Vulnerability from fkie_nvd - Published: 2024-06-19 14:15 - Updated: 2025-04-01 18:36| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/168f6fbde0eabd71d1f4133df7d001a950b96977 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/f12afddfb142587d786df9e3cc4862190d3e2ec8 | Patch | |
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/f79edef79b6a2161f4124112f9b0c46891bb0b74 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/168f6fbde0eabd71d1f4133df7d001a950b96977 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/f12afddfb142587d786df9e3cc4862190d3e2ec8 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/stable/c/f79edef79b6a2161f4124112f9b0c46891bb0b74 | Patch |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6B700363-C7D6-4F81-97AB-953F84ED37B0",
"versionEndExcluding": "6.8.12",
"versionStartIncluding": "6.8.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011",
"versionEndExcluding": "6.9.3",
"versionStartIncluding": "6.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mana_ib: boundary check before installing cq callbacks\n\nAdd a boundary check inside mana_ib_install_cq_cb to prevent index overflow."
},
{
"lang": "es",
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: RDMA/mana_ib: verificaci\u00f3n de los l\u00edmites antes de instalar devoluciones de llamadas de cq Agregue una verificaci\u00f3n de los l\u00edmites dentro de mana_ib_install_cq_cb para evitar el desbordamiento del \u00edndice."
}
],
"id": "CVE-2024-38542",
"lastModified": "2025-04-01T18:36:50.130",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-06-19T14:15:14.487",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/168f6fbde0eabd71d1f4133df7d001a950b96977"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/f12afddfb142587d786df9e3cc4862190d3e2ec8"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/f79edef79b6a2161f4124112f9b0c46891bb0b74"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/168f6fbde0eabd71d1f4133df7d001a950b96977"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/f12afddfb142587d786df9e3cc4862190d3e2ec8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/f79edef79b6a2161f4124112f9b0c46891bb0b74"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-129"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTFR-2024-AVI-0694
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-46343",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46343"
},
{
"name": "CVE-2024-25744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
},
{
"name": "CVE-2023-52436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52436"
},
{
"name": "CVE-2023-52443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52443"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52449"
},
{
"name": "CVE-2023-52444",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52444"
},
{
"name": "CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2024-25739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25739"
},
{
"name": "CVE-2024-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25742"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2023-52620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52620"
},
{
"name": "CVE-2024-26980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26980"
},
{
"name": "CVE-2024-27013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27013"
},
{
"name": "CVE-2024-26840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26840"
},
{
"name": "CVE-2024-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26934"
},
{
"name": "CVE-2024-26882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26882"
},
{
"name": "CVE-2024-27020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27020"
},
{
"name": "CVE-2024-26936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26936"
},
{
"name": "CVE-2024-26857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26857"
},
{
"name": "CVE-2024-26884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26884"
},
{
"name": "CVE-2024-26901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26901"
},
{
"name": "CVE-2024-27019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27019"
},
{
"name": "CVE-2024-26923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26923"
},
{
"name": "CVE-2023-52585",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52585"
},
{
"name": "CVE-2023-52882",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52882"
},
{
"name": "CVE-2024-26900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26900"
},
{
"name": "CVE-2024-27398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27398"
},
{
"name": "CVE-2024-27399",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27399"
},
{
"name": "CVE-2024-27401",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27401"
},
{
"name": "CVE-2024-35848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
},
{
"name": "CVE-2024-35947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35947"
},
{
"name": "CVE-2024-36017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
},
{
"name": "CVE-2024-36031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36031"
},
{
"name": "CVE-2024-36883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36883"
},
{
"name": "CVE-2024-36886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36886"
},
{
"name": "CVE-2024-36889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36889"
},
{
"name": "CVE-2024-36902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36902"
},
{
"name": "CVE-2024-36904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36904"
},
{
"name": "CVE-2024-36905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36905"
},
{
"name": "CVE-2024-36916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36916"
},
{
"name": "CVE-2024-36919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36919"
},
{
"name": "CVE-2024-36929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36929"
},
{
"name": "CVE-2024-36933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36933"
},
{
"name": "CVE-2024-36934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36934"
},
{
"name": "CVE-2024-36939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36939"
},
{
"name": "CVE-2024-36940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36940"
},
{
"name": "CVE-2024-36941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
},
{
"name": "CVE-2024-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36946"
},
{
"name": "CVE-2024-36950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36950"
},
{
"name": "CVE-2024-36953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36953"
},
{
"name": "CVE-2024-36954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36954"
},
{
"name": "CVE-2024-36957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36957"
},
{
"name": "CVE-2024-36959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36959"
},
{
"name": "CVE-2024-27395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27395"
},
{
"name": "CVE-2024-27396",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27396"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2024-35847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35847"
},
{
"name": "CVE-2024-35849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35849"
},
{
"name": "CVE-2024-35851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35851"
},
{
"name": "CVE-2024-35852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
},
{
"name": "CVE-2024-35854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
},
{
"name": "CVE-2024-35976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35976"
},
{
"name": "CVE-2024-35978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35978"
},
{
"name": "CVE-2024-35982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35982"
},
{
"name": "CVE-2024-35984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35984"
},
{
"name": "CVE-2024-35989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35989"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2024-36006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36006"
},
{
"name": "CVE-2024-36007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36007"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36014"
},
{
"name": "CVE-2024-36015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36015"
},
{
"name": "CVE-2024-36016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36016"
},
{
"name": "CVE-2024-36029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36029"
},
{
"name": "CVE-2024-36032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36032"
},
{
"name": "CVE-2024-36880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36880"
},
{
"name": "CVE-2024-36893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36893"
},
{
"name": "CVE-2024-36896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36896"
},
{
"name": "CVE-2024-36897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36897"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-36928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36928"
},
{
"name": "CVE-2024-36931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36931"
},
{
"name": "CVE-2024-36938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36938"
},
{
"name": "CVE-2024-36944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36944"
},
{
"name": "CVE-2024-36947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36947"
},
{
"name": "CVE-2024-36952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36952"
},
{
"name": "CVE-2024-36955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36955"
},
{
"name": "CVE-2024-35850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35850"
},
{
"name": "CVE-2024-35986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35986"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-35997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35997"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-36030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36030"
},
{
"name": "CVE-2024-36890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36890"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36894"
},
{
"name": "CVE-2024-36895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36895"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2024-31076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31076"
},
{
"name": "CVE-2024-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33621"
},
{
"name": "CVE-2024-35853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
},
{
"name": "CVE-2024-35855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-35988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35988"
},
{
"name": "CVE-2024-35996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35996"
},
{
"name": "CVE-2024-36004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
},
{
"name": "CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"name": "CVE-2024-36286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36286"
},
{
"name": "CVE-2024-36960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36960"
},
{
"name": "CVE-2024-36964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36964"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2024-37353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37353"
},
{
"name": "CVE-2024-37356",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37356"
},
{
"name": "CVE-2024-38381",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38381"
},
{
"name": "CVE-2024-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38549"
},
{
"name": "CVE-2024-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38552"
},
{
"name": "CVE-2024-38558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38558"
},
{
"name": "CVE-2024-38559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38559"
},
{
"name": "CVE-2024-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38560"
},
{
"name": "CVE-2024-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38565"
},
{
"name": "CVE-2024-38567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38567"
},
{
"name": "CVE-2024-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38578"
},
{
"name": "CVE-2024-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38579"
},
{
"name": "CVE-2024-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38582"
},
{
"name": "CVE-2024-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38583"
},
{
"name": "CVE-2024-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38587"
},
{
"name": "CVE-2024-38589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38589"
},
{
"name": "CVE-2024-38596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38596"
},
{
"name": "CVE-2024-38598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38598"
},
{
"name": "CVE-2024-38599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38599"
},
{
"name": "CVE-2024-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38601"
},
{
"name": "CVE-2024-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38612"
},
{
"name": "CVE-2024-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38618"
},
{
"name": "CVE-2024-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38621"
},
{
"name": "CVE-2024-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
},
{
"name": "CVE-2024-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38633"
},
{
"name": "CVE-2024-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38634"
},
{
"name": "CVE-2024-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38637"
},
{
"name": "CVE-2024-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38659"
},
{
"name": "CVE-2024-38780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38780"
},
{
"name": "CVE-2024-39292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39292"
},
{
"name": "CVE-2024-26886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26886"
},
{
"name": "CVE-2024-26952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26952"
},
{
"name": "CVE-2022-48772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48772"
},
{
"name": "CVE-2023-52752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52752"
},
{
"name": "CVE-2024-35857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35857"
},
{
"name": "CVE-2024-36899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36899"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2024-36923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36923"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36965"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36969"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2024-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38544"
},
{
"name": "CVE-2024-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38545"
},
{
"name": "CVE-2024-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38546"
},
{
"name": "CVE-2024-38547",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38547"
},
{
"name": "CVE-2024-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38548"
},
{
"name": "CVE-2024-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38550"
},
{
"name": "CVE-2024-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38553"
},
{
"name": "CVE-2024-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38555"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2024-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38568"
},
{
"name": "CVE-2024-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38571"
},
{
"name": "CVE-2024-38573",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38573"
},
{
"name": "CVE-2024-38580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38580"
},
{
"name": "CVE-2024-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38590"
},
{
"name": "CVE-2024-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38591"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2024-38597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38597"
},
{
"name": "CVE-2024-38600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38600"
},
{
"name": "CVE-2024-38603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38603"
},
{
"name": "CVE-2024-38605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38605"
},
{
"name": "CVE-2024-38616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38616"
},
{
"name": "CVE-2024-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38635"
},
{
"name": "CVE-2024-38661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38661"
},
{
"name": "CVE-2024-39301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39301"
},
{
"name": "CVE-2024-39471",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39471"
},
{
"name": "CVE-2024-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38610"
},
{
"name": "CVE-2024-39475",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39475"
},
{
"name": "CVE-2024-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24859"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-36270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36270"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2024-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
},
{
"name": "CVE-2024-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38593"
},
{
"name": "CVE-2024-38607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38607"
},
{
"name": "CVE-2024-38613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38613"
},
{
"name": "CVE-2024-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38615"
},
{
"name": "CVE-2024-39276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39276"
},
{
"name": "CVE-2024-39467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39467"
},
{
"name": "CVE-2024-39480",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39480"
},
{
"name": "CVE-2024-39482",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39482"
},
{
"name": "CVE-2024-39488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39488"
},
{
"name": "CVE-2024-39489",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39489"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36887"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-36935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36935"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38539"
},
{
"name": "CVE-2024-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38551"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2024-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38562"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38569"
},
{
"name": "CVE-2024-38570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38570"
},
{
"name": "CVE-2024-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38572"
},
{
"name": "CVE-2024-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38575"
},
{
"name": "CVE-2024-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38588"
},
{
"name": "CVE-2024-38592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38592"
},
{
"name": "CVE-2024-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38595"
},
{
"name": "CVE-2024-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38602"
},
{
"name": "CVE-2024-38611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38611"
},
{
"name": "CVE-2024-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38617"
},
{
"name": "CVE-2022-48674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48674"
},
{
"name": "CVE-2024-27394",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27394"
},
{
"name": "CVE-2024-35846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35846"
},
{
"name": "CVE-2024-35856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35856"
},
{
"name": "CVE-2024-35858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35858"
},
{
"name": "CVE-2024-35859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35859"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2024-35987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35987"
},
{
"name": "CVE-2024-35993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35993"
},
{
"name": "CVE-2024-35994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35994"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2024-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36001"
},
{
"name": "CVE-2024-36003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36003"
},
{
"name": "CVE-2024-36028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36028"
},
{
"name": "CVE-2024-36033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36033"
},
{
"name": "CVE-2024-36881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36881"
},
{
"name": "CVE-2024-36884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36884"
},
{
"name": "CVE-2024-36888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36888"
},
{
"name": "CVE-2024-36892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36892"
},
{
"name": "CVE-2024-36901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36901"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2024-36912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36912"
},
{
"name": "CVE-2024-36913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36913"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2024-36925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36925"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2024-36932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36932"
},
{
"name": "CVE-2024-36943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36943"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2024-36956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36956"
},
{
"name": "CVE-2024-36958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36958"
},
{
"name": "CVE-2024-36961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36961"
},
{
"name": "CVE-2024-36963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36963"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2024-36968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36968"
},
{
"name": "CVE-2024-36979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36979"
},
{
"name": "CVE-2024-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38538"
},
{
"name": "CVE-2024-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38542"
},
{
"name": "CVE-2024-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38561"
},
{
"name": "CVE-2024-38563",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38563"
},
{
"name": "CVE-2024-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38574"
},
{
"name": "CVE-2024-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38576"
},
{
"name": "CVE-2024-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38577"
},
{
"name": "CVE-2024-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38584"
},
{
"name": "CVE-2024-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38585"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2024-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38614"
},
{
"name": "CVE-2024-38620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38620"
},
{
"name": "CVE-2024-41011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41011"
},
{
"name": "CVE-2024-42134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42134"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0694",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2024-08-09",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6926-3",
"url": "https://ubuntu.com/security/notices/USN-6926-3"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6950-2",
"url": "https://ubuntu.com/security/notices/USN-6950-2"
},
{
"published_at": "2024-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6955-1",
"url": "https://ubuntu.com/security/notices/USN-6955-1"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6949-2",
"url": "https://ubuntu.com/security/notices/USN-6949-2"
},
{
"published_at": "2024-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6956-1",
"url": "https://ubuntu.com/security/notices/USN-6956-1"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6957-1",
"url": "https://ubuntu.com/security/notices/USN-6957-1"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6950-3",
"url": "https://ubuntu.com/security/notices/USN-6950-3"
},
{
"published_at": "2024-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6951-2",
"url": "https://ubuntu.com/security/notices/USN-6951-2"
}
]
}
CERTFR-2024-AVI-0667
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "N/A",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "N/A",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "N/A",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "N/A",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "N/A",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-46343",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46343"
},
{
"name": "CVE-2024-25744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
},
{
"name": "CVE-2024-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
},
{
"name": "CVE-2023-52436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52436"
},
{
"name": "CVE-2023-52443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52443"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52449"
},
{
"name": "CVE-2023-52444",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52444"
},
{
"name": "CVE-2024-26601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26601"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2024-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1151"
},
{
"name": "CVE-2023-6270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6270"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2024-26642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26642"
},
{
"name": "CVE-2024-26667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26667"
},
{
"name": "CVE-2024-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0841"
},
{
"name": "CVE-2024-26695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26695"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-26659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26659"
},
{
"name": "CVE-2023-52637",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52637"
},
{
"name": "CVE-2024-25739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25739"
},
{
"name": "CVE-2024-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25742"
},
{
"name": "CVE-2024-26664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
},
{
"name": "CVE-2024-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23307"
},
{
"name": "CVE-2024-26584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
},
{
"name": "CVE-2024-26707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26707"
},
{
"name": "CVE-2024-26697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26697"
},
{
"name": "CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"name": "CVE-2024-26689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26689"
},
{
"name": "CVE-2024-26748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26748"
},
{
"name": "CVE-2023-52638",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52638"
},
{
"name": "CVE-2024-26606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26606"
},
{
"name": "CVE-2024-26718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26718"
},
{
"name": "CVE-2024-26702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26702"
},
{
"name": "CVE-2024-26685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26685"
},
{
"name": "CVE-2024-26583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
},
{
"name": "CVE-2024-26710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26710"
},
{
"name": "CVE-2024-26803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26803"
},
{
"name": "CVE-2024-26798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26798"
},
{
"name": "CVE-2024-26663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2023-52631",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52631"
},
{
"name": "CVE-2024-26712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26712"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2024-26723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26723"
},
{
"name": "CVE-2024-26684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26684"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26789"
},
{
"name": "CVE-2024-26679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26679"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2024-26676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26676"
},
{
"name": "CVE-2024-26688",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26688"
},
{
"name": "CVE-2024-26802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26802"
},
{
"name": "CVE-2024-26722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26722"
},
{
"name": "CVE-2024-26681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26681"
},
{
"name": "CVE-2024-26733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26733"
},
{
"name": "CVE-2023-52620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52620"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-26665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26665"
},
{
"name": "CVE-2024-26696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26696"
},
{
"name": "CVE-2024-26698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26698"
},
{
"name": "CVE-2024-26790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26790"
},
{
"name": "CVE-2024-26715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26715"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26792",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26792"
},
{
"name": "CVE-2024-26680",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26680"
},
{
"name": "CVE-2024-26736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26736"
},
{
"name": "CVE-2024-26782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26782"
},
{
"name": "CVE-2024-26980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26980"
},
{
"name": "CVE-2024-26917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26917"
},
{
"name": "CVE-2024-27013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27013"
},
{
"name": "CVE-2024-26840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26840"
},
{
"name": "CVE-2024-26910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26910"
},
{
"name": "CVE-2024-26907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26907"
},
{
"name": "CVE-2024-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26934"
},
{
"name": "CVE-2024-26889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26889"
},
{
"name": "CVE-2024-26882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26882"
},
{
"name": "CVE-2024-27020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27020"
},
{
"name": "CVE-2024-26820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26820"
},
{
"name": "CVE-2024-26936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26936"
},
{
"name": "CVE-2024-24861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24861"
},
{
"name": "CVE-2024-26920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26920"
},
{
"name": "CVE-2024-26857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26857"
},
{
"name": "CVE-2024-26898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26898"
},
{
"name": "CVE-2023-52642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52642"
},
{
"name": "CVE-2024-26922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26922"
},
{
"name": "CVE-2024-26884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26884"
},
{
"name": "CVE-2024-26825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26825"
},
{
"name": "CVE-2024-26901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26901"
},
{
"name": "CVE-2024-27019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27019"
},
{
"name": "CVE-2024-26923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26923"
},
{
"name": "CVE-2024-26926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26926"
},
{
"name": "CVE-2024-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
},
{
"name": "CVE-2024-26916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26916"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2024-26829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26829"
},
{
"name": "CVE-2024-26830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26830"
},
{
"name": "CVE-2023-52645",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52645"
},
{
"name": "CVE-2021-47131",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47131"
},
{
"name": "CVE-2023-52585",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52585"
},
{
"name": "CVE-2022-48655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48655"
},
{
"name": "CVE-2024-26828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26828"
},
{
"name": "CVE-2024-26693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26693"
},
{
"name": "CVE-2024-26694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26694"
},
{
"name": "CVE-2024-26919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26919"
},
{
"name": "CVE-2023-52882",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52882"
},
{
"name": "CVE-2024-26900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26900"
},
{
"name": "CVE-2024-27398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27398"
},
{
"name": "CVE-2024-27399",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27399"
},
{
"name": "CVE-2024-27401",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27401"
},
{
"name": "CVE-2024-35848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
},
{
"name": "CVE-2024-35947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35947"
},
{
"name": "CVE-2024-36017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
},
{
"name": "CVE-2024-36031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36031"
},
{
"name": "CVE-2024-36883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36883"
},
{
"name": "CVE-2024-36886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36886"
},
{
"name": "CVE-2024-36889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36889"
},
{
"name": "CVE-2024-36902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36902"
},
{
"name": "CVE-2024-36904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36904"
},
{
"name": "CVE-2024-36905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36905"
},
{
"name": "CVE-2024-36916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36916"
},
{
"name": "CVE-2024-36919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36919"
},
{
"name": "CVE-2024-36929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36929"
},
{
"name": "CVE-2024-36933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36933"
},
{
"name": "CVE-2024-36934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36934"
},
{
"name": "CVE-2024-36939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36939"
},
{
"name": "CVE-2024-36940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36940"
},
{
"name": "CVE-2024-36941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
},
{
"name": "CVE-2024-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36946"
},
{
"name": "CVE-2024-36950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36950"
},
{
"name": "CVE-2024-36953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36953"
},
{
"name": "CVE-2024-36954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36954"
},
{
"name": "CVE-2024-36957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36957"
},
{
"name": "CVE-2024-36959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36959"
},
{
"name": "CVE-2023-52880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52880"
},
{
"name": "CVE-2024-26822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26822"
},
{
"name": "CVE-2024-26838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26838"
},
{
"name": "CVE-2024-27395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27395"
},
{
"name": "CVE-2024-27396",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27396"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2024-27416",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27416"
},
{
"name": "CVE-2024-35833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35833"
},
{
"name": "CVE-2024-35847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35847"
},
{
"name": "CVE-2024-35849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35849"
},
{
"name": "CVE-2024-35851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35851"
},
{
"name": "CVE-2024-35852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
},
{
"name": "CVE-2024-35854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
},
{
"name": "CVE-2024-35976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35976"
},
{
"name": "CVE-2024-35978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35978"
},
{
"name": "CVE-2024-35982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35982"
},
{
"name": "CVE-2024-35984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35984"
},
{
"name": "CVE-2024-35989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35989"
},
{
"name": "CVE-2024-35990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35990"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2024-36006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36006"
},
{
"name": "CVE-2024-36007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36007"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36014"
},
{
"name": "CVE-2024-36015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36015"
},
{
"name": "CVE-2024-36016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36016"
},
{
"name": "CVE-2024-36029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36029"
},
{
"name": "CVE-2024-36032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36032"
},
{
"name": "CVE-2024-36880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36880"
},
{
"name": "CVE-2024-36893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36893"
},
{
"name": "CVE-2024-36896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36896"
},
{
"name": "CVE-2024-36897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36897"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-36928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36928"
},
{
"name": "CVE-2024-36931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36931"
},
{
"name": "CVE-2024-36938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36938"
},
{
"name": "CVE-2024-36944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36944"
},
{
"name": "CVE-2024-36947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36947"
},
{
"name": "CVE-2024-36952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36952"
},
{
"name": "CVE-2024-36955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36955"
},
{
"name": "CVE-2024-26674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26674"
},
{
"name": "CVE-2024-35850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35850"
},
{
"name": "CVE-2024-35986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35986"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-35992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35992"
},
{
"name": "CVE-2024-35997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35997"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-36030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36030"
},
{
"name": "CVE-2024-36890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36890"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36894"
},
{
"name": "CVE-2024-36895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36895"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2024-31076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31076"
},
{
"name": "CVE-2024-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33621"
},
{
"name": "CVE-2024-35853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
},
{
"name": "CVE-2024-35855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-35988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35988"
},
{
"name": "CVE-2024-35996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35996"
},
{
"name": "CVE-2024-36004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
},
{
"name": "CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"name": "CVE-2024-36008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36008"
},
{
"name": "CVE-2024-36286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36286"
},
{
"name": "CVE-2024-36960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36960"
},
{
"name": "CVE-2024-36964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36964"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2024-37353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37353"
},
{
"name": "CVE-2024-37356",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37356"
},
{
"name": "CVE-2024-38381",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38381"
},
{
"name": "CVE-2024-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38549"
},
{
"name": "CVE-2024-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38552"
},
{
"name": "CVE-2024-38558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38558"
},
{
"name": "CVE-2024-38559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38559"
},
{
"name": "CVE-2024-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38560"
},
{
"name": "CVE-2024-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38565"
},
{
"name": "CVE-2024-38567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38567"
},
{
"name": "CVE-2024-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38578"
},
{
"name": "CVE-2024-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38579"
},
{
"name": "CVE-2024-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38582"
},
{
"name": "CVE-2024-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38583"
},
{
"name": "CVE-2024-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38587"
},
{
"name": "CVE-2024-38589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38589"
},
{
"name": "CVE-2024-38596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38596"
},
{
"name": "CVE-2024-38598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38598"
},
{
"name": "CVE-2024-38599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38599"
},
{
"name": "CVE-2024-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38601"
},
{
"name": "CVE-2024-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38612"
},
{
"name": "CVE-2024-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38618"
},
{
"name": "CVE-2024-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38621"
},
{
"name": "CVE-2024-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
},
{
"name": "CVE-2024-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38633"
},
{
"name": "CVE-2024-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38634"
},
{
"name": "CVE-2024-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38637"
},
{
"name": "CVE-2024-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38659"
},
{
"name": "CVE-2024-38780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38780"
},
{
"name": "CVE-2024-39292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39292"
},
{
"name": "CVE-2024-26886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26886"
},
{
"name": "CVE-2024-26890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26890"
},
{
"name": "CVE-2022-48772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48772"
},
{
"name": "CVE-2023-52752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52752"
},
{
"name": "CVE-2024-35857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35857"
},
{
"name": "CVE-2024-36899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36899"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2024-36923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36923"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36965"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36969"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2024-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38544"
},
{
"name": "CVE-2024-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38545"
},
{
"name": "CVE-2024-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38546"
},
{
"name": "CVE-2024-38547",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38547"
},
{
"name": "CVE-2024-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38548"
},
{
"name": "CVE-2024-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38550"
},
{
"name": "CVE-2024-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38553"
},
{
"name": "CVE-2024-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38555"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2024-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38568"
},
{
"name": "CVE-2024-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38571"
},
{
"name": "CVE-2024-38573",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38573"
},
{
"name": "CVE-2024-38580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38580"
},
{
"name": "CVE-2024-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38590"
},
{
"name": "CVE-2024-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38591"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2024-38597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38597"
},
{
"name": "CVE-2024-38600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38600"
},
{
"name": "CVE-2024-38603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38603"
},
{
"name": "CVE-2024-38605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38605"
},
{
"name": "CVE-2024-38616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38616"
},
{
"name": "CVE-2024-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38635"
},
{
"name": "CVE-2024-38661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38661"
},
{
"name": "CVE-2024-39301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39301"
},
{
"name": "CVE-2024-39471",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39471"
},
{
"name": "CVE-2024-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38610"
},
{
"name": "CVE-2024-39475",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39475"
},
{
"name": "CVE-2024-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24859"
},
{
"name": "CVE-2024-26661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26661"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2024-26666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26666"
},
{
"name": "CVE-2024-26677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26677"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2024-26703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26703"
},
{
"name": "CVE-2024-26708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26708"
},
{
"name": "CVE-2024-26711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26711"
},
{
"name": "CVE-2024-26716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26716"
},
{
"name": "CVE-2024-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26719"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26824"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-36270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36270"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2024-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
},
{
"name": "CVE-2024-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38593"
},
{
"name": "CVE-2024-38607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38607"
},
{
"name": "CVE-2024-38613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38613"
},
{
"name": "CVE-2024-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38615"
},
{
"name": "CVE-2024-39276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39276"
},
{
"name": "CVE-2024-39467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39467"
},
{
"name": "CVE-2024-39480",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39480"
},
{
"name": "CVE-2024-39482",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39482"
},
{
"name": "CVE-2024-39488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39488"
},
{
"name": "CVE-2024-39489",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39489"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36887"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-36935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36935"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38539"
},
{
"name": "CVE-2024-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38551"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2024-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38562"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38569"
},
{
"name": "CVE-2024-38570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38570"
},
{
"name": "CVE-2024-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38572"
},
{
"name": "CVE-2024-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38575"
},
{
"name": "CVE-2024-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38588"
},
{
"name": "CVE-2024-38592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38592"
},
{
"name": "CVE-2024-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38595"
},
{
"name": "CVE-2024-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38602"
},
{
"name": "CVE-2024-38611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38611"
},
{
"name": "CVE-2024-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38617"
},
{
"name": "CVE-2022-48674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48674"
},
{
"name": "CVE-2024-27394",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27394"
},
{
"name": "CVE-2024-35846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35846"
},
{
"name": "CVE-2024-35856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35856"
},
{
"name": "CVE-2024-35858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35858"
},
{
"name": "CVE-2024-35859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35859"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2024-35987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35987"
},
{
"name": "CVE-2024-35993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35993"
},
{
"name": "CVE-2024-35994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35994"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2024-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36001"
},
{
"name": "CVE-2024-36003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36003"
},
{
"name": "CVE-2024-36028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36028"
},
{
"name": "CVE-2024-36033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36033"
},
{
"name": "CVE-2024-36881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36881"
},
{
"name": "CVE-2024-36884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36884"
},
{
"name": "CVE-2024-36888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36888"
},
{
"name": "CVE-2024-36892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36892"
},
{
"name": "CVE-2024-36901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36901"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2024-36912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36912"
},
{
"name": "CVE-2024-36913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36913"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2024-36925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36925"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2024-36932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36932"
},
{
"name": "CVE-2024-36943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36943"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2024-36956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36956"
},
{
"name": "CVE-2024-36958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36958"
},
{
"name": "CVE-2024-36961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36961"
},
{
"name": "CVE-2024-36963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36963"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2024-36968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36968"
},
{
"name": "CVE-2024-36979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36979"
},
{
"name": "CVE-2024-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38538"
},
{
"name": "CVE-2024-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38542"
},
{
"name": "CVE-2024-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38561"
},
{
"name": "CVE-2024-38563",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38563"
},
{
"name": "CVE-2024-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38574"
},
{
"name": "CVE-2024-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38576"
},
{
"name": "CVE-2024-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38577"
},
{
"name": "CVE-2024-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38584"
},
{
"name": "CVE-2024-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38585"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2024-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38614"
},
{
"name": "CVE-2024-38620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38620"
},
{
"name": "CVE-2024-41011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41011"
},
{
"name": "CVE-2024-42134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42134"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0667",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2024-08-02",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6895-4",
"url": "https://ubuntu.com/security/notices/USN-6895-4"
},
{
"published_at": "2024-08-08",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6951-1",
"url": "https://ubuntu.com/security/notices/USN-6951-1"
},
{
"published_at": "2024-08-01",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6926-2",
"url": "https://ubuntu.com/security/notices/USN-6926-2"
},
{
"published_at": "2024-08-09",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6952-1",
"url": "https://ubuntu.com/security/notices/USN-6952-1"
},
{
"published_at": "2024-08-08",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6949-1",
"url": "https://ubuntu.com/security/notices/USN-6949-1"
},
{
"published_at": "2024-08-01",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6922-2",
"url": "https://ubuntu.com/security/notices/USN-6922-2"
},
{
"published_at": "2024-08-08",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6950-1",
"url": "https://ubuntu.com/security/notices/USN-6950-1"
},
{
"published_at": "2024-08-09",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6953-1",
"url": "https://ubuntu.com/security/notices/USN-6953-1"
}
]
}
CERTFR-2024-AVI-0667
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "N/A",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 ESM",
"product": {
"name": "N/A",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "N/A",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "N/A",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "N/A",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-46343",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46343"
},
{
"name": "CVE-2024-25744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
},
{
"name": "CVE-2024-26600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26600"
},
{
"name": "CVE-2023-52436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52436"
},
{
"name": "CVE-2023-52443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52443"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52449"
},
{
"name": "CVE-2023-52444",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52444"
},
{
"name": "CVE-2024-26601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26601"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2024-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1151"
},
{
"name": "CVE-2023-6270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6270"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2024-26642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26642"
},
{
"name": "CVE-2024-26667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26667"
},
{
"name": "CVE-2024-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0841"
},
{
"name": "CVE-2024-26695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26695"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-26659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26659"
},
{
"name": "CVE-2023-52637",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52637"
},
{
"name": "CVE-2024-25739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25739"
},
{
"name": "CVE-2024-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25742"
},
{
"name": "CVE-2024-26664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
},
{
"name": "CVE-2024-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23307"
},
{
"name": "CVE-2024-26584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
},
{
"name": "CVE-2024-26707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26707"
},
{
"name": "CVE-2024-26697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26697"
},
{
"name": "CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"name": "CVE-2024-26689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26689"
},
{
"name": "CVE-2024-26748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26748"
},
{
"name": "CVE-2023-52638",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52638"
},
{
"name": "CVE-2024-26606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26606"
},
{
"name": "CVE-2024-26718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26718"
},
{
"name": "CVE-2024-26702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26702"
},
{
"name": "CVE-2024-26685",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26685"
},
{
"name": "CVE-2024-26583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
},
{
"name": "CVE-2024-26710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26710"
},
{
"name": "CVE-2024-26803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26803"
},
{
"name": "CVE-2024-26798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26798"
},
{
"name": "CVE-2024-26663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2023-52631",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52631"
},
{
"name": "CVE-2024-26712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26712"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2024-26723",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26723"
},
{
"name": "CVE-2024-26684",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26684"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26789"
},
{
"name": "CVE-2024-26679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26679"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2024-26676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26676"
},
{
"name": "CVE-2024-26688",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26688"
},
{
"name": "CVE-2024-26802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26802"
},
{
"name": "CVE-2024-26722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26722"
},
{
"name": "CVE-2024-26681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26681"
},
{
"name": "CVE-2024-26733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26733"
},
{
"name": "CVE-2023-52620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52620"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-26665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26665"
},
{
"name": "CVE-2024-26696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26696"
},
{
"name": "CVE-2024-26698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26698"
},
{
"name": "CVE-2024-26790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26790"
},
{
"name": "CVE-2024-26715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26715"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26792",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26792"
},
{
"name": "CVE-2024-26680",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26680"
},
{
"name": "CVE-2024-26736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26736"
},
{
"name": "CVE-2024-26782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26782"
},
{
"name": "CVE-2024-26980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26980"
},
{
"name": "CVE-2024-26917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26917"
},
{
"name": "CVE-2024-27013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27013"
},
{
"name": "CVE-2024-26840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26840"
},
{
"name": "CVE-2024-26910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26910"
},
{
"name": "CVE-2024-26907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26907"
},
{
"name": "CVE-2024-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26934"
},
{
"name": "CVE-2024-26889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26889"
},
{
"name": "CVE-2024-26882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26882"
},
{
"name": "CVE-2024-27020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27020"
},
{
"name": "CVE-2024-26820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26820"
},
{
"name": "CVE-2024-26936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26936"
},
{
"name": "CVE-2024-24861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24861"
},
{
"name": "CVE-2024-26920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26920"
},
{
"name": "CVE-2024-26857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26857"
},
{
"name": "CVE-2024-26898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26898"
},
{
"name": "CVE-2023-52642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52642"
},
{
"name": "CVE-2024-26922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26922"
},
{
"name": "CVE-2024-26884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26884"
},
{
"name": "CVE-2024-26825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26825"
},
{
"name": "CVE-2024-26901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26901"
},
{
"name": "CVE-2024-27019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27019"
},
{
"name": "CVE-2024-26923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26923"
},
{
"name": "CVE-2024-26926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26926"
},
{
"name": "CVE-2024-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
},
{
"name": "CVE-2024-26916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26916"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2024-26829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26829"
},
{
"name": "CVE-2024-26830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26830"
},
{
"name": "CVE-2023-52645",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52645"
},
{
"name": "CVE-2021-47131",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47131"
},
{
"name": "CVE-2023-52585",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52585"
},
{
"name": "CVE-2022-48655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48655"
},
{
"name": "CVE-2024-26828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26828"
},
{
"name": "CVE-2024-26693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26693"
},
{
"name": "CVE-2024-26694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26694"
},
{
"name": "CVE-2024-26919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26919"
},
{
"name": "CVE-2023-52882",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52882"
},
{
"name": "CVE-2024-26900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26900"
},
{
"name": "CVE-2024-27398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27398"
},
{
"name": "CVE-2024-27399",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27399"
},
{
"name": "CVE-2024-27401",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27401"
},
{
"name": "CVE-2024-35848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
},
{
"name": "CVE-2024-35947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35947"
},
{
"name": "CVE-2024-36017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
},
{
"name": "CVE-2024-36031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36031"
},
{
"name": "CVE-2024-36883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36883"
},
{
"name": "CVE-2024-36886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36886"
},
{
"name": "CVE-2024-36889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36889"
},
{
"name": "CVE-2024-36902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36902"
},
{
"name": "CVE-2024-36904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36904"
},
{
"name": "CVE-2024-36905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36905"
},
{
"name": "CVE-2024-36916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36916"
},
{
"name": "CVE-2024-36919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36919"
},
{
"name": "CVE-2024-36929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36929"
},
{
"name": "CVE-2024-36933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36933"
},
{
"name": "CVE-2024-36934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36934"
},
{
"name": "CVE-2024-36939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36939"
},
{
"name": "CVE-2024-36940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36940"
},
{
"name": "CVE-2024-36941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
},
{
"name": "CVE-2024-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36946"
},
{
"name": "CVE-2024-36950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36950"
},
{
"name": "CVE-2024-36953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36953"
},
{
"name": "CVE-2024-36954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36954"
},
{
"name": "CVE-2024-36957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36957"
},
{
"name": "CVE-2024-36959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36959"
},
{
"name": "CVE-2023-52880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52880"
},
{
"name": "CVE-2024-26822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26822"
},
{
"name": "CVE-2024-26838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26838"
},
{
"name": "CVE-2024-27395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27395"
},
{
"name": "CVE-2024-27396",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27396"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2024-27416",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27416"
},
{
"name": "CVE-2024-35833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35833"
},
{
"name": "CVE-2024-35847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35847"
},
{
"name": "CVE-2024-35849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35849"
},
{
"name": "CVE-2024-35851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35851"
},
{
"name": "CVE-2024-35852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
},
{
"name": "CVE-2024-35854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
},
{
"name": "CVE-2024-35976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35976"
},
{
"name": "CVE-2024-35978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35978"
},
{
"name": "CVE-2024-35982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35982"
},
{
"name": "CVE-2024-35984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35984"
},
{
"name": "CVE-2024-35989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35989"
},
{
"name": "CVE-2024-35990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35990"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2024-36006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36006"
},
{
"name": "CVE-2024-36007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36007"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36014"
},
{
"name": "CVE-2024-36015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36015"
},
{
"name": "CVE-2024-36016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36016"
},
{
"name": "CVE-2024-36029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36029"
},
{
"name": "CVE-2024-36032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36032"
},
{
"name": "CVE-2024-36880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36880"
},
{
"name": "CVE-2024-36893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36893"
},
{
"name": "CVE-2024-36896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36896"
},
{
"name": "CVE-2024-36897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36897"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-36928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36928"
},
{
"name": "CVE-2024-36931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36931"
},
{
"name": "CVE-2024-36938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36938"
},
{
"name": "CVE-2024-36944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36944"
},
{
"name": "CVE-2024-36947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36947"
},
{
"name": "CVE-2024-36952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36952"
},
{
"name": "CVE-2024-36955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36955"
},
{
"name": "CVE-2024-26674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26674"
},
{
"name": "CVE-2024-35850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35850"
},
{
"name": "CVE-2024-35986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35986"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-35992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35992"
},
{
"name": "CVE-2024-35997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35997"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-36030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36030"
},
{
"name": "CVE-2024-36890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36890"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36894"
},
{
"name": "CVE-2024-36895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36895"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2024-31076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31076"
},
{
"name": "CVE-2024-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33621"
},
{
"name": "CVE-2024-35853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
},
{
"name": "CVE-2024-35855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-35988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35988"
},
{
"name": "CVE-2024-35996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35996"
},
{
"name": "CVE-2024-36004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
},
{
"name": "CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"name": "CVE-2024-36008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36008"
},
{
"name": "CVE-2024-36286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36286"
},
{
"name": "CVE-2024-36960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36960"
},
{
"name": "CVE-2024-36964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36964"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2024-37353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37353"
},
{
"name": "CVE-2024-37356",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37356"
},
{
"name": "CVE-2024-38381",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38381"
},
{
"name": "CVE-2024-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38549"
},
{
"name": "CVE-2024-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38552"
},
{
"name": "CVE-2024-38558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38558"
},
{
"name": "CVE-2024-38559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38559"
},
{
"name": "CVE-2024-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38560"
},
{
"name": "CVE-2024-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38565"
},
{
"name": "CVE-2024-38567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38567"
},
{
"name": "CVE-2024-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38578"
},
{
"name": "CVE-2024-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38579"
},
{
"name": "CVE-2024-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38582"
},
{
"name": "CVE-2024-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38583"
},
{
"name": "CVE-2024-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38587"
},
{
"name": "CVE-2024-38589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38589"
},
{
"name": "CVE-2024-38596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38596"
},
{
"name": "CVE-2024-38598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38598"
},
{
"name": "CVE-2024-38599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38599"
},
{
"name": "CVE-2024-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38601"
},
{
"name": "CVE-2024-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38612"
},
{
"name": "CVE-2024-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38618"
},
{
"name": "CVE-2024-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38621"
},
{
"name": "CVE-2024-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
},
{
"name": "CVE-2024-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38633"
},
{
"name": "CVE-2024-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38634"
},
{
"name": "CVE-2024-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38637"
},
{
"name": "CVE-2024-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38659"
},
{
"name": "CVE-2024-38780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38780"
},
{
"name": "CVE-2024-39292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39292"
},
{
"name": "CVE-2024-26886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26886"
},
{
"name": "CVE-2024-26890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26890"
},
{
"name": "CVE-2022-48772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48772"
},
{
"name": "CVE-2023-52752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52752"
},
{
"name": "CVE-2024-35857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35857"
},
{
"name": "CVE-2024-36899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36899"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2024-36923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36923"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36965"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36969"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2024-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38544"
},
{
"name": "CVE-2024-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38545"
},
{
"name": "CVE-2024-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38546"
},
{
"name": "CVE-2024-38547",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38547"
},
{
"name": "CVE-2024-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38548"
},
{
"name": "CVE-2024-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38550"
},
{
"name": "CVE-2024-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38553"
},
{
"name": "CVE-2024-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38555"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2024-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38568"
},
{
"name": "CVE-2024-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38571"
},
{
"name": "CVE-2024-38573",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38573"
},
{
"name": "CVE-2024-38580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38580"
},
{
"name": "CVE-2024-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38590"
},
{
"name": "CVE-2024-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38591"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2024-38597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38597"
},
{
"name": "CVE-2024-38600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38600"
},
{
"name": "CVE-2024-38603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38603"
},
{
"name": "CVE-2024-38605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38605"
},
{
"name": "CVE-2024-38616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38616"
},
{
"name": "CVE-2024-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38635"
},
{
"name": "CVE-2024-38661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38661"
},
{
"name": "CVE-2024-39301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39301"
},
{
"name": "CVE-2024-39471",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39471"
},
{
"name": "CVE-2024-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38610"
},
{
"name": "CVE-2024-39475",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39475"
},
{
"name": "CVE-2024-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24859"
},
{
"name": "CVE-2024-26661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26661"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2024-26666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26666"
},
{
"name": "CVE-2024-26677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26677"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2024-26703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26703"
},
{
"name": "CVE-2024-26708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26708"
},
{
"name": "CVE-2024-26711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26711"
},
{
"name": "CVE-2024-26716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26716"
},
{
"name": "CVE-2024-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26719"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26824"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-36270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36270"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2024-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
},
{
"name": "CVE-2024-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38593"
},
{
"name": "CVE-2024-38607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38607"
},
{
"name": "CVE-2024-38613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38613"
},
{
"name": "CVE-2024-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38615"
},
{
"name": "CVE-2024-39276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39276"
},
{
"name": "CVE-2024-39467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39467"
},
{
"name": "CVE-2024-39480",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39480"
},
{
"name": "CVE-2024-39482",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39482"
},
{
"name": "CVE-2024-39488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39488"
},
{
"name": "CVE-2024-39489",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39489"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36887"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-36935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36935"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38539"
},
{
"name": "CVE-2024-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38551"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2024-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38562"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38569"
},
{
"name": "CVE-2024-38570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38570"
},
{
"name": "CVE-2024-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38572"
},
{
"name": "CVE-2024-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38575"
},
{
"name": "CVE-2024-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38588"
},
{
"name": "CVE-2024-38592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38592"
},
{
"name": "CVE-2024-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38595"
},
{
"name": "CVE-2024-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38602"
},
{
"name": "CVE-2024-38611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38611"
},
{
"name": "CVE-2024-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38617"
},
{
"name": "CVE-2022-48674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48674"
},
{
"name": "CVE-2024-27394",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27394"
},
{
"name": "CVE-2024-35846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35846"
},
{
"name": "CVE-2024-35856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35856"
},
{
"name": "CVE-2024-35858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35858"
},
{
"name": "CVE-2024-35859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35859"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2024-35987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35987"
},
{
"name": "CVE-2024-35993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35993"
},
{
"name": "CVE-2024-35994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35994"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2024-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36001"
},
{
"name": "CVE-2024-36003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36003"
},
{
"name": "CVE-2024-36028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36028"
},
{
"name": "CVE-2024-36033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36033"
},
{
"name": "CVE-2024-36881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36881"
},
{
"name": "CVE-2024-36884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36884"
},
{
"name": "CVE-2024-36888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36888"
},
{
"name": "CVE-2024-36892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36892"
},
{
"name": "CVE-2024-36901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36901"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2024-36912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36912"
},
{
"name": "CVE-2024-36913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36913"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2024-36925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36925"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2024-36932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36932"
},
{
"name": "CVE-2024-36943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36943"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2024-36956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36956"
},
{
"name": "CVE-2024-36958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36958"
},
{
"name": "CVE-2024-36961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36961"
},
{
"name": "CVE-2024-36963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36963"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2024-36968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36968"
},
{
"name": "CVE-2024-36979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36979"
},
{
"name": "CVE-2024-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38538"
},
{
"name": "CVE-2024-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38542"
},
{
"name": "CVE-2024-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38561"
},
{
"name": "CVE-2024-38563",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38563"
},
{
"name": "CVE-2024-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38574"
},
{
"name": "CVE-2024-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38576"
},
{
"name": "CVE-2024-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38577"
},
{
"name": "CVE-2024-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38584"
},
{
"name": "CVE-2024-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38585"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2024-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38614"
},
{
"name": "CVE-2024-38620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38620"
},
{
"name": "CVE-2024-41011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41011"
},
{
"name": "CVE-2024-42134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42134"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0667",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2024-08-02",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6895-4",
"url": "https://ubuntu.com/security/notices/USN-6895-4"
},
{
"published_at": "2024-08-08",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6951-1",
"url": "https://ubuntu.com/security/notices/USN-6951-1"
},
{
"published_at": "2024-08-01",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6926-2",
"url": "https://ubuntu.com/security/notices/USN-6926-2"
},
{
"published_at": "2024-08-09",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6952-1",
"url": "https://ubuntu.com/security/notices/USN-6952-1"
},
{
"published_at": "2024-08-08",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6949-1",
"url": "https://ubuntu.com/security/notices/USN-6949-1"
},
{
"published_at": "2024-08-01",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6922-2",
"url": "https://ubuntu.com/security/notices/USN-6922-2"
},
{
"published_at": "2024-08-08",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6950-1",
"url": "https://ubuntu.com/security/notices/USN-6950-1"
},
{
"published_at": "2024-08-09",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6953-1",
"url": "https://ubuntu.com/security/notices/USN-6953-1"
}
]
}
CERTFR-2026-AVI-0369
Vulnerability from certfr_avis - Published: 2026-03-27 - Updated: 2026-03-27
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | Public Cloud Module | Public Cloud Module 15-SP7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.6 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | SUSE Linux Enterprise Workstation Extension | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | Basesystem Module | Basesystem Module 15-SP7 | ||
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.1 | ||
| SUSE | Legacy Module | Legacy Module 15-SP7 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP6 LTSS | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP7 | ||
| SUSE | Development Tools Module | Development Tools Module 15-SP7 | ||
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 | ||
| SUSE | SUSE Linux Micro Extras | SUSE Linux Micro Extras 6.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Public Cloud Module 15-SP7",
"product": {
"name": "Public Cloud Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP7",
"product": {
"name": "Basesystem Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP7",
"product": {
"name": "Legacy Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP7",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP7",
"product": {
"name": "Development Tools Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.0",
"product": {
"name": "SUSE Linux Micro Extras",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-68234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68234"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2023-54076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54076"
},
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2023-53797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53797"
},
{
"name": "CVE-2023-53863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53863"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2023-54142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54142"
},
{
"name": "CVE-2025-68374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68374"
},
{
"name": "CVE-2026-23129",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23129"
},
{
"name": "CVE-2023-54000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54000"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2023-54091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54091"
},
{
"name": "CVE-2023-54083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54083"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2023-53821",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53821"
},
{
"name": "CVE-2023-53799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53799"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2026-23269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23269"
},
{
"name": "CVE-2023-54309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54309"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2023-53995",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53995"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2023-54255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54255"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2025-71071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71071"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-54297",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54297"
},
{
"name": "CVE-2023-54112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54112"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-71135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71135"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2023-54313",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54313"
},
{
"name": "CVE-2023-53759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53759"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2025-68773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68773"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2023-53994",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53994"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2023-54095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54095"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-54143",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54143"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2023-53813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53813"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2026-23139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23139"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2026-23017",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23017"
},
{
"name": "CVE-2023-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53864"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-71189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71189"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2023-54246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54246"
},
{
"name": "CVE-2025-71088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71088"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2025-38243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38243"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2023-54001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54001"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2026-23210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23210"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2023-54106",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54106"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-53793",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53793"
},
{
"name": "CVE-2023-54096",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54096"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2023-54283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54283"
},
{
"name": "CVE-2023-54049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54049"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2023-54066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54066"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2023-54117",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54117"
},
{
"name": "CVE-2023-53999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53999"
},
{
"name": "CVE-2023-54038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54038"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2023-54315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54315"
},
{
"name": "CVE-2026-23135",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23135"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2023-54211",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54211"
},
{
"name": "CVE-2023-54251",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54251"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2023-54156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54156"
},
{
"name": "CVE-2026-23173",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23173"
},
{
"name": "CVE-2026-23268",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23268"
},
{
"name": "CVE-2023-53750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53750"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2023-54037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54037"
},
{
"name": "CVE-2023-53815",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53815"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2023-54031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54031"
},
{
"name": "CVE-2026-23094",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23094"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2022-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50756"
},
{
"name": "CVE-2023-53989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53989"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-68235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68235"
},
{
"name": "CVE-2025-68770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68770"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2023-54254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54254"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-54312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54312"
},
{
"name": "CVE-2023-54094",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54094"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2023-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53792"
},
{
"name": "CVE-2023-54164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54164"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2026-22989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22989"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2023-54316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54316"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2023-54089",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54089"
},
{
"name": "CVE-2026-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23163"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2026-23057",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23057"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2025-71138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71138"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-54322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54322"
},
{
"name": "CVE-2023-54155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54155"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2026-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23166"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2023-54276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54276"
},
{
"name": "CVE-2023-42752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42752"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2023-54048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54048"
},
{
"name": "CVE-2023-54278",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54278"
},
{
"name": "CVE-2023-54215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54215"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2023-53777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53777"
},
{
"name": "CVE-2023-54133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54133"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2026-23116",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23116"
},
{
"name": "CVE-2023-54148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54148"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-54064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54064"
},
{
"name": "CVE-2023-54153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54153"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2025-71200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71200"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2025-68218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68218"
},
{
"name": "CVE-2023-53848",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53848"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2023-53828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53828"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2026-23172",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23172"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2026-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23131"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2023-53834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53834"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2023-54170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54170"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2022-50453",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50453"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2026-23005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23005"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2023-54223",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54223"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2023-54045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54045"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2023-54101",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54101"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2023-54179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54179"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2023-54289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54289"
},
{
"name": "CVE-2023-54177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54177"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2025-71130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71130"
},
{
"name": "CVE-2023-54013",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54013"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2023-54093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54093"
},
{
"name": "CVE-2023-53839",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53839"
},
{
"name": "CVE-2023-53752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53752"
},
{
"name": "CVE-2023-53802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53802"
},
{
"name": "CVE-2025-38224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38224"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2023-54318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54318"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-71126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71126"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2025-68252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68252"
},
{
"name": "CVE-2023-54166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54166"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2023-54136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54136"
},
{
"name": "CVE-2023-54225",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54225"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-68237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68237"
},
{
"name": "CVE-2023-54194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54194"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2026-23006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23006"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2025-68789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68789"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2023-53843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53843"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38379"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2023-53844",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53844"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2023-54026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54026"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2026-23023",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23023"
},
{
"name": "CVE-2023-53858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53858"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2023-54266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54266"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-68222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68222"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2023-53825",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53825"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2023-54072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54072"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2023-54134",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54134"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2023-54184",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54184"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2023-54291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54291"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2023-53865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53865"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2023-53823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53823"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2025-68744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68744"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2023-54241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54241"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2023-54017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54017"
},
{
"name": "CVE-2023-53257",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53257"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2023-53787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53787"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2024-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53149"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2023-54154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54154"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2023-54141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54141"
},
{
"name": "CVE-2023-53766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53766"
},
{
"name": "CVE-2026-23107",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23107"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2023-53795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53795"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2023-53819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53819"
},
{
"name": "CVE-2023-54210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54210"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2023-54030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54030"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2023-54092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54092"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2023-53997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53997"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2026-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23151"
},
{
"name": "CVE-2025-71145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71145"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2026-23152",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23152"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22047"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2023-54224",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54224"
},
{
"name": "CVE-2023-54235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54235"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-54032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54032"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2023-6040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6040"
},
{
"name": "CVE-2023-53856",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53856"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2023-53817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53817"
},
{
"name": "CVE-2023-53782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53782"
},
{
"name": "CVE-2023-54115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54115"
},
{
"name": "CVE-2023-54069",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54069"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2023-54104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54104"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2023-54027",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54027"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2026-22993",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22993"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2023-53851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53851"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2023-54183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54183"
},
{
"name": "CVE-2023-53841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53841"
},
{
"name": "CVE-2023-54326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54326"
},
{
"name": "CVE-2023-54267",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54267"
},
{
"name": "CVE-2023-54282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54282"
},
{
"name": "CVE-2025-71234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71234"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2022-50697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50697"
},
{
"name": "CVE-2025-70873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-70873"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2026-22985",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22985"
},
{
"name": "CVE-2023-54006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54006"
},
{
"name": "CVE-2023-53784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53784"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2023-54264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54264"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2025-68351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68351"
},
{
"name": "CVE-2023-54304",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54304"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2023-54173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54173"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2023-53842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53842"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2023-53762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53762"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2023-54127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54127"
},
{
"name": "CVE-2023-53861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53861"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2023-54137",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54137"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2023-54319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54319"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-23065",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23065"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2023-54140",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54140"
},
{
"name": "CVE-2025-68775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68775"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2023-54025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54025"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2023-54229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54229"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2023-54300",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54300"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2023-54042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54042"
},
{
"name": "CVE-2023-53807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53807"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2023-54302",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54302"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2023-54178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54178"
},
{
"name": "CVE-2023-54051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54051"
},
{
"name": "CVE-2023-53808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53808"
},
{
"name": "CVE-2025-71148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71148"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2023-54008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54008"
},
{
"name": "CVE-2026-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23156"
},
{
"name": "CVE-2023-54014",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54014"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2026-23062",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23062"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2023-54258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54258"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2023-54221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54221"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2023-53827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53827"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2023-54293",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54293"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2026-23070",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23070"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2022-50423",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50423"
},
{
"name": "CVE-2023-54060",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54060"
},
{
"name": "CVE-2026-23104",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23104"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2023-53778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53778"
},
{
"name": "CVE-2025-39817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39817"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2023-54171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54171"
},
{
"name": "CVE-2023-54240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54240"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-71123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71123"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2024-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38542"
},
{
"name": "CVE-2025-71100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71100"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2023-54070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54070"
},
{
"name": "CVE-2023-54204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54204"
},
{
"name": "CVE-2026-23010",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23010"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-54303",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54303"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2023-53998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53998"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2023-53852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53852"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2026-22988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22988"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2023-54135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54135"
},
{
"name": "CVE-2023-53996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53996"
},
{
"name": "CVE-2025-68233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68233"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2024-26944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26944"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-71119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71119"
},
{
"name": "CVE-2023-54314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54314"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2023-54292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54292"
},
{
"name": "CVE-2026-23102",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23102"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2023-54113",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54113"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2026-23082",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23082"
},
{
"name": "CVE-2023-53836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53836"
},
{
"name": "CVE-2026-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23155"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2023-53857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53857"
},
{
"name": "CVE-2023-53860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53860"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2023-54169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54169"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2023-54281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54281"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2025-71231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71231"
},
{
"name": "CVE-2023-54080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54080"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2025-68810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68810"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2025-39813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39813"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2023-54022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54022"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2023-54296",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54296"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-68735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68735"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2023-54220",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54220"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2023-54209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54209"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2026-25702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25702"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2026-23053",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23053"
},
{
"name": "CVE-2023-54189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54189"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2023-54230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54230"
},
{
"name": "CVE-2023-53831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53831"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-68195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68195"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2023-54299",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54299"
},
{
"name": "CVE-2023-53768",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53768"
},
{
"name": "CVE-2025-71149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71149"
},
{
"name": "CVE-2023-54099",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54099"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2023-54219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54219"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2023-53847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53847"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2023-54005",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54005"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
}
],
"initial_release_date": "2026-03-27T00:00:00",
"last_revision_date": "2026-03-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0369",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20774-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620774-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0970-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260970-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0983-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260983-1"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0985-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260985-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1077-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261077-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20778-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620778-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20779-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620779-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0961-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260961-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1073-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261073-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20789-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620789-1"
},
{
"published_at": "2026-03-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0946-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260946-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0962-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260962-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0967-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260967-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20775-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620775-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1088-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261088-1"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0939-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260939-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20814-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620814-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1046-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261046-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20788-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620788-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20786-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620786-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0954-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260954-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20819-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620819-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1045-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261045-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20815-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620815-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1060-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261060-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20790-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620790-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20772-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620772-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20776-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620776-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1002-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261002-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0984-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260984-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0964-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260964-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20781-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620781-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1081-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261081-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1048-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261048-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1059-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261059-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0958-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260958-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1000-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261000-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1039-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261039-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20791-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620791-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20773-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620773-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20816-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620816-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1083-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261083-1"
},
{
"published_at": "2026-03-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0951-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260951-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20787-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620787-1"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0992-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260992-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20777-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620777-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1089-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261089-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1078-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261078-1"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0997-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260997-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1003-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261003-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20794-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620794-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1041-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261041-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20780-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620780-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1049-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261049-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1044-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261044-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20817-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620817-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20782-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620782-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20792-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620792-1"
},
{
"published_at": "2026-03-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0953-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260953-1"
}
]
}
CERTFR-2024-AVI-0694
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 24.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 22.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-46343",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46343"
},
{
"name": "CVE-2024-25744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
},
{
"name": "CVE-2023-52436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52436"
},
{
"name": "CVE-2023-52443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52443"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52449"
},
{
"name": "CVE-2023-52444",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52444"
},
{
"name": "CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2024-25739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25739"
},
{
"name": "CVE-2024-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25742"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2023-52620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52620"
},
{
"name": "CVE-2024-26980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26980"
},
{
"name": "CVE-2024-27013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27013"
},
{
"name": "CVE-2024-26840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26840"
},
{
"name": "CVE-2024-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26934"
},
{
"name": "CVE-2024-26882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26882"
},
{
"name": "CVE-2024-27020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27020"
},
{
"name": "CVE-2024-26936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26936"
},
{
"name": "CVE-2024-26857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26857"
},
{
"name": "CVE-2024-26884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26884"
},
{
"name": "CVE-2024-26901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26901"
},
{
"name": "CVE-2024-27019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27019"
},
{
"name": "CVE-2024-26923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26923"
},
{
"name": "CVE-2023-52585",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52585"
},
{
"name": "CVE-2023-52882",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52882"
},
{
"name": "CVE-2024-26900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26900"
},
{
"name": "CVE-2024-27398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27398"
},
{
"name": "CVE-2024-27399",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27399"
},
{
"name": "CVE-2024-27401",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27401"
},
{
"name": "CVE-2024-35848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
},
{
"name": "CVE-2024-35947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35947"
},
{
"name": "CVE-2024-36017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
},
{
"name": "CVE-2024-36031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36031"
},
{
"name": "CVE-2024-36883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36883"
},
{
"name": "CVE-2024-36886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36886"
},
{
"name": "CVE-2024-36889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36889"
},
{
"name": "CVE-2024-36902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36902"
},
{
"name": "CVE-2024-36904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36904"
},
{
"name": "CVE-2024-36905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36905"
},
{
"name": "CVE-2024-36916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36916"
},
{
"name": "CVE-2024-36919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36919"
},
{
"name": "CVE-2024-36929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36929"
},
{
"name": "CVE-2024-36933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36933"
},
{
"name": "CVE-2024-36934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36934"
},
{
"name": "CVE-2024-36939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36939"
},
{
"name": "CVE-2024-36940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36940"
},
{
"name": "CVE-2024-36941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
},
{
"name": "CVE-2024-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36946"
},
{
"name": "CVE-2024-36950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36950"
},
{
"name": "CVE-2024-36953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36953"
},
{
"name": "CVE-2024-36954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36954"
},
{
"name": "CVE-2024-36957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36957"
},
{
"name": "CVE-2024-36959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36959"
},
{
"name": "CVE-2024-27395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27395"
},
{
"name": "CVE-2024-27396",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27396"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2024-35847",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35847"
},
{
"name": "CVE-2024-35849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35849"
},
{
"name": "CVE-2024-35851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35851"
},
{
"name": "CVE-2024-35852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
},
{
"name": "CVE-2024-35854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
},
{
"name": "CVE-2024-35976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35976"
},
{
"name": "CVE-2024-35978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35978"
},
{
"name": "CVE-2024-35982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35982"
},
{
"name": "CVE-2024-35984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35984"
},
{
"name": "CVE-2024-35989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35989"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2024-36006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36006"
},
{
"name": "CVE-2024-36007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36007"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36014"
},
{
"name": "CVE-2024-36015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36015"
},
{
"name": "CVE-2024-36016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36016"
},
{
"name": "CVE-2024-36029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36029"
},
{
"name": "CVE-2024-36032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36032"
},
{
"name": "CVE-2024-36880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36880"
},
{
"name": "CVE-2024-36893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36893"
},
{
"name": "CVE-2024-36896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36896"
},
{
"name": "CVE-2024-36897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36897"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-36928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36928"
},
{
"name": "CVE-2024-36931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36931"
},
{
"name": "CVE-2024-36938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36938"
},
{
"name": "CVE-2024-36944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36944"
},
{
"name": "CVE-2024-36947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36947"
},
{
"name": "CVE-2024-36952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36952"
},
{
"name": "CVE-2024-36955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36955"
},
{
"name": "CVE-2024-35850",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35850"
},
{
"name": "CVE-2024-35986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35986"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-35997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35997"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-36030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36030"
},
{
"name": "CVE-2024-36890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36890"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36894"
},
{
"name": "CVE-2024-36895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36895"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2024-31076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31076"
},
{
"name": "CVE-2024-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33621"
},
{
"name": "CVE-2024-35853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
},
{
"name": "CVE-2024-35855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-35988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35988"
},
{
"name": "CVE-2024-35996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35996"
},
{
"name": "CVE-2024-36004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
},
{
"name": "CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"name": "CVE-2024-36286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36286"
},
{
"name": "CVE-2024-36960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36960"
},
{
"name": "CVE-2024-36964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36964"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2024-37353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37353"
},
{
"name": "CVE-2024-37356",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37356"
},
{
"name": "CVE-2024-38381",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38381"
},
{
"name": "CVE-2024-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38549"
},
{
"name": "CVE-2024-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38552"
},
{
"name": "CVE-2024-38558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38558"
},
{
"name": "CVE-2024-38559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38559"
},
{
"name": "CVE-2024-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38560"
},
{
"name": "CVE-2024-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38565"
},
{
"name": "CVE-2024-38567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38567"
},
{
"name": "CVE-2024-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38578"
},
{
"name": "CVE-2024-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38579"
},
{
"name": "CVE-2024-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38582"
},
{
"name": "CVE-2024-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38583"
},
{
"name": "CVE-2024-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38587"
},
{
"name": "CVE-2024-38589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38589"
},
{
"name": "CVE-2024-38596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38596"
},
{
"name": "CVE-2024-38598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38598"
},
{
"name": "CVE-2024-38599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38599"
},
{
"name": "CVE-2024-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38601"
},
{
"name": "CVE-2024-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38612"
},
{
"name": "CVE-2024-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38618"
},
{
"name": "CVE-2024-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38621"
},
{
"name": "CVE-2024-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
},
{
"name": "CVE-2024-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38633"
},
{
"name": "CVE-2024-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38634"
},
{
"name": "CVE-2024-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38637"
},
{
"name": "CVE-2024-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38659"
},
{
"name": "CVE-2024-38780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38780"
},
{
"name": "CVE-2024-39292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39292"
},
{
"name": "CVE-2024-26886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26886"
},
{
"name": "CVE-2024-26952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26952"
},
{
"name": "CVE-2022-48772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48772"
},
{
"name": "CVE-2023-52752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52752"
},
{
"name": "CVE-2024-35857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35857"
},
{
"name": "CVE-2024-36899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36899"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2024-36923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36923"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36965"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36969"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2024-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38544"
},
{
"name": "CVE-2024-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38545"
},
{
"name": "CVE-2024-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38546"
},
{
"name": "CVE-2024-38547",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38547"
},
{
"name": "CVE-2024-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38548"
},
{
"name": "CVE-2024-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38550"
},
{
"name": "CVE-2024-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38553"
},
{
"name": "CVE-2024-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38555"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2024-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38568"
},
{
"name": "CVE-2024-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38571"
},
{
"name": "CVE-2024-38573",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38573"
},
{
"name": "CVE-2024-38580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38580"
},
{
"name": "CVE-2024-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38590"
},
{
"name": "CVE-2024-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38591"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2024-38597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38597"
},
{
"name": "CVE-2024-38600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38600"
},
{
"name": "CVE-2024-38603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38603"
},
{
"name": "CVE-2024-38605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38605"
},
{
"name": "CVE-2024-38616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38616"
},
{
"name": "CVE-2024-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38635"
},
{
"name": "CVE-2024-38661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38661"
},
{
"name": "CVE-2024-39301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39301"
},
{
"name": "CVE-2024-39471",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39471"
},
{
"name": "CVE-2024-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38610"
},
{
"name": "CVE-2024-39475",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39475"
},
{
"name": "CVE-2024-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24859"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-36270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36270"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2024-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
},
{
"name": "CVE-2024-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38593"
},
{
"name": "CVE-2024-38607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38607"
},
{
"name": "CVE-2024-38613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38613"
},
{
"name": "CVE-2024-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38615"
},
{
"name": "CVE-2024-39276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39276"
},
{
"name": "CVE-2024-39467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39467"
},
{
"name": "CVE-2024-39480",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39480"
},
{
"name": "CVE-2024-39482",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39482"
},
{
"name": "CVE-2024-39488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39488"
},
{
"name": "CVE-2024-39489",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39489"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36887"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-36935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36935"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38539"
},
{
"name": "CVE-2024-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38551"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2024-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38562"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38569"
},
{
"name": "CVE-2024-38570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38570"
},
{
"name": "CVE-2024-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38572"
},
{
"name": "CVE-2024-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38575"
},
{
"name": "CVE-2024-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38588"
},
{
"name": "CVE-2024-38592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38592"
},
{
"name": "CVE-2024-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38595"
},
{
"name": "CVE-2024-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38602"
},
{
"name": "CVE-2024-38611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38611"
},
{
"name": "CVE-2024-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38617"
},
{
"name": "CVE-2022-48674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48674"
},
{
"name": "CVE-2024-27394",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27394"
},
{
"name": "CVE-2024-35846",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35846"
},
{
"name": "CVE-2024-35856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35856"
},
{
"name": "CVE-2024-35858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35858"
},
{
"name": "CVE-2024-35859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35859"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2024-35987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35987"
},
{
"name": "CVE-2024-35993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35993"
},
{
"name": "CVE-2024-35994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35994"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2024-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36001"
},
{
"name": "CVE-2024-36003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36003"
},
{
"name": "CVE-2024-36028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36028"
},
{
"name": "CVE-2024-36033",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36033"
},
{
"name": "CVE-2024-36881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36881"
},
{
"name": "CVE-2024-36884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36884"
},
{
"name": "CVE-2024-36888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36888"
},
{
"name": "CVE-2024-36892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36892"
},
{
"name": "CVE-2024-36901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36901"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2024-36912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36912"
},
{
"name": "CVE-2024-36913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36913"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2024-36925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36925"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2024-36932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36932"
},
{
"name": "CVE-2024-36943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36943"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2024-36956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36956"
},
{
"name": "CVE-2024-36958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36958"
},
{
"name": "CVE-2024-36961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36961"
},
{
"name": "CVE-2024-36963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36963"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2024-36968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36968"
},
{
"name": "CVE-2024-36979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36979"
},
{
"name": "CVE-2024-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38538"
},
{
"name": "CVE-2024-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38542"
},
{
"name": "CVE-2024-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38561"
},
{
"name": "CVE-2024-38563",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38563"
},
{
"name": "CVE-2024-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38574"
},
{
"name": "CVE-2024-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38576"
},
{
"name": "CVE-2024-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38577"
},
{
"name": "CVE-2024-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38584"
},
{
"name": "CVE-2024-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38585"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2024-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38614"
},
{
"name": "CVE-2024-38620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38620"
},
{
"name": "CVE-2024-41011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41011"
},
{
"name": "CVE-2024-42134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42134"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0694",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux d\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": "2024-08-09",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6926-3",
"url": "https://ubuntu.com/security/notices/USN-6926-3"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6950-2",
"url": "https://ubuntu.com/security/notices/USN-6950-2"
},
{
"published_at": "2024-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6955-1",
"url": "https://ubuntu.com/security/notices/USN-6955-1"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6949-2",
"url": "https://ubuntu.com/security/notices/USN-6949-2"
},
{
"published_at": "2024-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6956-1",
"url": "https://ubuntu.com/security/notices/USN-6956-1"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6957-1",
"url": "https://ubuntu.com/security/notices/USN-6957-1"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6950-3",
"url": "https://ubuntu.com/security/notices/USN-6950-3"
},
{
"published_at": "2024-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-6951-2",
"url": "https://ubuntu.com/security/notices/USN-6951-2"
}
]
}
GHSA-7G8P-3G9Q-44R8
Vulnerability from github – Published: 2024-06-19 15:30 – Updated: 2024-11-07 18:31In the Linux kernel, the following vulnerability has been resolved:
RDMA/mana_ib: boundary check before installing cq callbacks
Add a boundary check inside mana_ib_install_cq_cb to prevent index overflow.
{
"affected": [],
"aliases": [
"CVE-2024-38542"
],
"database_specific": {
"cwe_ids": [
"CWE-129"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-06-19T14:15:14Z",
"severity": "HIGH"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mana_ib: boundary check before installing cq callbacks\n\nAdd a boundary check inside mana_ib_install_cq_cb to prevent index overflow.",
"id": "GHSA-7g8p-3g9q-44r8",
"modified": "2024-11-07T18:31:21Z",
"published": "2024-06-19T15:30:52Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38542"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/168f6fbde0eabd71d1f4133df7d001a950b96977"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/f12afddfb142587d786df9e3cc4862190d3e2ec8"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/f79edef79b6a2161f4124112f9b0c46891bb0b74"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2024-1418
Vulnerability from csaf_certbund - Published: 2024-06-19 22:00 - Updated: 2026-02-16 23:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1418 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1418.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1418 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1418"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47573 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061911-CVE-2021-47573-5c43@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47574 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061914-CVE-2021-47574-18b4@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47575 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061914-CVE-2021-47575-a011@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47576 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061914-CVE-2021-47576-5f60@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47577 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061915-CVE-2021-47577-c4c7@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47578 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061915-CVE-2021-47578-e81a@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47579 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061915-CVE-2021-47579-4f78@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47580 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061916-CVE-2021-47580-eac9@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47581 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061916-CVE-2021-47581-1d34@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47582 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061916-CVE-2021-47582-69aa@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47583 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061916-CVE-2021-47583-b02c@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47584 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061917-CVE-2021-47584-5246@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47585 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061917-CVE-2021-47585-0a6a@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47586 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061917-CVE-2021-47586-69ce@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47587 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061918-CVE-2021-47587-9146@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47588 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061918-CVE-2021-47588-7298@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47589 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061918-CVE-2021-47589-d405@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47590 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47591 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47591-955a@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47592 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47592-7ca6@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47593 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47593-a7a7@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47594 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061920-CVE-2021-47594-953e@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47595 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061920-CVE-2021-47595-e9f3@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47596 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061920-CVE-2021-47596-cd94@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47597 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061921-CVE-2021-47597-7dd2@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47598 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061921-CVE-2021-47598-3fad@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47599 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061921-CVE-2021-47599-37b9@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47600 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061922-CVE-2021-47600-5cc4@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47601 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061922-CVE-2021-47601-5e15@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47602 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061922-CVE-2021-47602-d8dc@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47603 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061922-CVE-2021-47603-ec18@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47604 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061923-CVE-2021-47604-e309@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47605 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061923-CVE-2021-47605-3d20@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47606 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061923-CVE-2021-47606-daa5@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47607 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061924-CVE-2021-47607-0fbd@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47608 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061924-CVE-2021-47608-f4eb@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47609 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061907-CVE-2021-47609-5ebf@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47610 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061907-CVE-2021-47610-ed0a@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47611 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061907-CVE-2021-47611-907d@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47612 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47612-1c98@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47613 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47613-47d5@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47614 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47615 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061909-CVE-2021-47615-3c6a@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2021-47616 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061909-CVE-2021-47616-5ee0@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-36979 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061945-CVE-2024-36979-b4a6@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38538 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061947-CVE-2024-38538-e28a@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38539 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061947-CVE-2024-38539-5ae1@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38540 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061947-CVE-2024-38540-1d0a@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38541 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061948-CVE-2024-38541-53d0@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38542 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061948-CVE-2024-38542-2481@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38543 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061948-CVE-2024-38543-ff2e@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38544 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061949-CVE-2024-38544-601b@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38545 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061949-CVE-2024-38545-7161@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38546 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061949-CVE-2024-38546-ce19@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38547 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061950-CVE-2024-38547-176a@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38548 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061950-CVE-2024-38548-29a5@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38549 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061950-CVE-2024-38549-6ae4@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38550 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061950-CVE-2024-38550-a20b@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38551 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061951-CVE-2024-38551-babb@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38552 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061951-CVE-2024-38552-dba6@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38553 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061951-CVE-2024-38553-2e34@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38554 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061952-CVE-2024-38554-29b0@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38555 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061952-CVE-2024-38555-aefb@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38556 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061952-CVE-2024-38556-8afa@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38557 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061953-CVE-2024-38557-2cb9@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38558 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061953-CVE-2024-38558-ddfd@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38559 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061953-CVE-2024-38559-3e03@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38560 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061953-CVE-2024-38560-f0a2@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38561 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061954-CVE-2024-38561-2505@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38562 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061954-CVE-2024-38562-21d9@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38563 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061954-CVE-2024-38563-2c2e@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38564 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061955-CVE-2024-38564-b069@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38565 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061955-CVE-2024-38565-9d22@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38566 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061955-CVE-2024-38566-0ac6@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38567 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38567-5724@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38568 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38568-86e2@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38569 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38569-2a26@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38570 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38570-a8ef@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38571 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061957-CVE-2024-38571-fbe7@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38572 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061957-CVE-2024-38572-28d5@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38573 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061957-CVE-2024-38573-d4b6@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38574 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061958-CVE-2024-38574-d9a9@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38575 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061946-CVE-2024-38575-8b6b@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38576 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061946-CVE-2024-38576-a4a4@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38577 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061947-CVE-2024-38577-7369@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38578 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061947-CVE-2024-38578-6bf2@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38579 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061947-CVE-2024-38579-e96a@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38580 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061948-CVE-2024-38580-d87f@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38581 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061948-CVE-2024-38581-592d@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38582 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061948-CVE-2024-38582-6165@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38583 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061948-CVE-2024-38583-9fb7@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38584 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061949-CVE-2024-38584-6a99@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38585 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061949-CVE-2024-38585-4af2@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38586 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061949-CVE-2024-38586-70d6@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38587 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061950-CVE-2024-38587-46ec@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38588 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061950-CVE-2024-38588-f908@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38589 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061954-CVE-2024-38589-de10@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38590 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061954-CVE-2024-38590-55eb@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38591 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061954-CVE-2024-38591-a4ae@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38592 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061955-CVE-2024-38592-5b29@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38593 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061955-CVE-2024-38593-8b0e@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38594 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061955-CVE-2024-38594-75c8@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38595 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061955-CVE-2024-38595-0721@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38596 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38596-f660@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38597 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38597-ad49@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38598 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061956-CVE-2024-38598-8629@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38599 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061957-CVE-2024-38599-9b9d@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38600 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061957-CVE-2024-38600-aa7e@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38601 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061923-CVE-2024-38601-dc52@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38602 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061924-CVE-2024-38602-e098@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38603 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061924-CVE-2024-38603-e1f0@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38604 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061924-CVE-2024-38604-a738@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38605 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061925-CVE-2024-38605-3dc4@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38606 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061925-CVE-2024-38606-6148@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38607 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061925-CVE-2024-38607-089e@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38608 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061920-CVE-2024-38608-4068@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38609 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061921-CVE-2024-38609-1fad@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38610 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061921-CVE-2024-38610-21f9@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38611 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061921-CVE-2024-38611-bb0f@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38612 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061922-CVE-2024-38612-7fc1@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38613 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061922-CVE-2024-38613-abc6@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38614 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061922-CVE-2024-38614-50ce@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38615 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061922-CVE-2024-38615-0d4c@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38616 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061923-CVE-2024-38616-5632@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38617 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061923-CVE-2024-38617-5530@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38618 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024061923-CVE-2024-38618-35a9@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement vom 2024-06-19",
"url": "https://kernel.org/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38620 vom 2024-06-19",
"url": "https://lore.kernel.org/linux-cve-announce/2024062047-CVE-2024-38620-64ef@gregkh/"
},
{
"category": "external",
"summary": "Linux CVE Announcement CVE-2024-38619 vom 2024-06-19",
"url": "http://lore.kernel.org/linux-cve-announce/2024062035-CVE-2024-38619-97c7@gregkh/"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3840 vom 2024-06-27",
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2360-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018907.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2372-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018901.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2362-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018905.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2365-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018897.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2381-1 vom 2024-07-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018916.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2384-1 vom 2024-07-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018921.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2394-1 vom 2024-07-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018922.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2385-1 vom 2024-07-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018920.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4533 vom 2024-07-15",
"url": "https://access.redhat.com/errata/RHSA-2024:4533"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4554 vom 2024-07-16",
"url": "https://access.redhat.com/errata/RHSA-2024:4554"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5730 vom 2024-07-16",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00141.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2493-1 vom 2024-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018984.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2495-1 vom 2024-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018982.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4583 vom 2024-07-17",
"url": "https://access.redhat.com/errata/RHSA-2024:4583"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5731 vom 2024-07-17",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00142.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2561-1 vom 2024-07-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-4583 vom 2024-07-19",
"url": "https://linux.oracle.com/errata/ELSA-2024-4583.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2571-1 vom 2024-07-22",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019019.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4823 vom 2024-07-24",
"url": "https://access.redhat.com/errata/RHSA-2024:4823"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4831 vom 2024-07-24",
"url": "https://access.redhat.com/errata/RHSA-2024:4831"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:4583 vom 2024-07-26",
"url": "https://errata.build.resf.org/RLSA-2024:4583"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4902 vom 2024-07-29",
"url": "https://access.redhat.com/errata/RHSA-2024:4902"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4928 vom 2024-07-31",
"url": "https://access.redhat.com/errata/RHSA-2024:4928"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:4928 vom 2024-08-01",
"url": "https://errata.build.resf.org/RLSA-2024:4928"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-4928 vom 2024-08-01",
"url": "https://linux.oracle.com/errata/ELSA-2024-4928.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5065 vom 2024-08-07",
"url": "https://access.redhat.com/errata/RHSA-2024:5065"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2802-1 vom 2024-08-07",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019133.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5102 vom 2024-08-08",
"url": "https://access.redhat.com/errata/RHSA-2024:5102"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5101 vom 2024-08-08",
"url": "https://access.redhat.com/errata/RHSA-2024:5101"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6951-1 vom 2024-08-09",
"url": "https://ubuntu.com/security/notices/USN-6951-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6949-1 vom 2024-08-09",
"url": "https://ubuntu.com/security/notices/USN-6949-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6953-1 vom 2024-08-09",
"url": "https://ubuntu.com/security/notices/USN-6953-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6950-1 vom 2024-08-09",
"url": "https://ubuntu.com/security/notices/USN-6950-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6952-1 vom 2024-08-09",
"url": "https://ubuntu.com/security/notices/USN-6952-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-5101 vom 2024-08-09",
"url": "https://linux.oracle.com/errata/ELSA-2024-5101.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5255 vom 2024-08-13",
"url": "https://access.redhat.com/errata/RHSA-2024:5255"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6956-1 vom 2024-08-13",
"url": "https://ubuntu.com/security/notices/USN-6956-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6955-1 vom 2024-08-12",
"url": "https://ubuntu.com/security/notices/USN-6955-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6957-1 vom 2024-08-13",
"url": "https://ubuntu.com/security/notices/USN-6957-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6950-2 vom 2024-08-13",
"url": "https://ubuntu.com/security/notices/USN-6950-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12584 vom 2024-08-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-12584.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12581 vom 2024-08-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-12581.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12585 vom 2024-08-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-12585.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2894-1 vom 2024-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019182.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2892-1 vom 2024-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019188.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6950-3 vom 2024-08-13",
"url": "https://ubuntu.com/security/notices/USN-6950-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6949-2 vom 2024-08-13",
"url": "https://ubuntu.com/security/notices/USN-6949-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2895-1 vom 2024-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2893-1 vom 2024-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019187.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-066 vom 2024-08-13",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-066.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2896-1 vom 2024-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019185.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5365 vom 2024-08-14",
"url": "https://access.redhat.com/errata/RHSA-2024:5365"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6952-2 vom 2024-08-13",
"url": "https://ubuntu.com/security/notices/USN-6952-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5363 vom 2024-08-14",
"url": "https://access.redhat.com/errata/RHSA-2024:5363"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5364 vom 2024-08-14",
"url": "https://access.redhat.com/errata/RHSA-2024:5364"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2902-1 vom 2024-08-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019193.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2901-1 vom 2024-08-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019194.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6951-2 vom 2024-08-14",
"url": "https://ubuntu.com/security/notices/USN-6951-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-5363 vom 2024-08-15",
"url": "https://linux.oracle.com/errata/ELSA-2024-5363.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2923-1 vom 2024-08-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019201.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2929-1 vom 2024-08-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019209.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2939-1 vom 2024-08-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019211.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2940-1 vom 2024-08-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019212.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2947-1 vom 2024-08-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019220.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2948-1 vom 2024-08-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019219.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6951-3 vom 2024-08-19",
"url": "https://ubuntu.com/security/notices/USN-6951-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2973-1 vom 2024-08-20",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019280.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2622 vom 2024-08-21",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2622.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5673 vom 2024-08-21",
"url": "https://access.redhat.com/errata/RHSA-2024:5673"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5672 vom 2024-08-21",
"url": "https://access.redhat.com/errata/RHSA-2024:5672"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:5102 vom 2024-08-21",
"url": "https://errata.build.resf.org/RLSA-2024:5102"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:5101 vom 2024-08-21",
"url": "https://errata.build.resf.org/RLSA-2024:5101"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6950-4 vom 2024-08-21",
"url": "https://ubuntu.com/security/notices/USN-6950-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5692 vom 2024-08-21",
"url": "https://access.redhat.com/errata/RHSA-2024:5692"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6951-4 vom 2024-08-21",
"url": "https://ubuntu.com/security/notices/USN-6951-4"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-081 vom 2024-08-21",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-081.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6979-1 vom 2024-08-22",
"url": "https://ubuntu.com/security/notices/USN-6979-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5928 vom 2024-08-28",
"url": "https://access.redhat.com/errata/RHSA-2024:5928"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-5928 vom 2024-08-29",
"url": "https://linux.oracle.com/errata/ELSA-2024-5928.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6267 vom 2024-09-04",
"url": "https://access.redhat.com/errata/RHSA-2024:6267"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6206 vom 2024-09-03",
"url": "https://access.redhat.com/errata/RHSA-2024:6206"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6268 vom 2024-09-04",
"url": "https://access.redhat.com/errata/RHSA-2024:6268"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6297 vom 2024-09-04",
"url": "https://access.redhat.com/errata/RHSA-2024:6297"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6567 vom 2024-09-11",
"url": "https://access.redhat.com/errata/RHSA-2024:6567"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3195-1 vom 2024-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019407.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3189-1 vom 2024-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019404.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3194-1 vom 2024-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019400.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3190-1 vom 2024-09-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019403.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12618 vom 2024-09-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-12618.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12612 vom 2024-09-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-12612.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6999-1 vom 2024-09-11",
"url": "https://ubuntu.com/security/notices/USN-6999-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3209-1 vom 2024-09-11",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNWVZVIFSX7PLBJX3I3PDZ4MIBERTN2Y/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12611 vom 2024-09-11",
"url": "https://linux.oracle.com/errata/ELSA-2024-12611.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12610 vom 2024-09-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-12610.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-6567 vom 2024-09-12",
"url": "https://linux.oracle.com/errata/ELSA-2024-6567.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7003-2 vom 2024-09-12",
"url": "https://ubuntu.com/security/notices/USN-7003-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7003-1 vom 2024-09-12",
"url": "https://ubuntu.com/security/notices/USN-7003-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7004-1 vom 2024-09-12",
"url": "https://ubuntu.com/security/notices/USN-7004-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7006-1 vom 2024-09-12",
"url": "https://ubuntu.com/security/notices/USN-7006-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7005-1 vom 2024-09-12",
"url": "https://ubuntu.com/security/notices/USN-7005-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7003-3 vom 2024-09-13",
"url": "https://ubuntu.com/security/notices/USN-7003-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7007-1 vom 2024-09-13",
"url": "https://ubuntu.com/security/notices/USN-7007-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7008-1 vom 2024-09-13",
"url": "https://ubuntu.com/security/notices/USN-7008-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7005-2 vom 2024-09-13",
"url": "https://ubuntu.com/security/notices/USN-7005-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7009-1 vom 2024-09-13",
"url": "https://ubuntu.com/security/notices/USN-7009-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3252-1 vom 2024-09-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019436.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:6567 vom 2024-09-17",
"url": "https://errata.build.resf.org/RLSA-2024:6567"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3251-1 vom 2024-09-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019435.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6744 vom 2024-09-18",
"url": "https://access.redhat.com/errata/RHSA-2024:6744"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6745 vom 2024-09-18",
"url": "https://access.redhat.com/errata/RHSA-2024:6745"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7021-1 vom 2024-09-18",
"url": "https://ubuntu.com/security/notices/USN-7021-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7022-1 vom 2024-09-18",
"url": "https://ubuntu.com/security/notices/USN-7022-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7007-2 vom 2024-09-23",
"url": "https://ubuntu.com/security/notices/USN-7007-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7028-1 vom 2024-09-23",
"url": "https://ubuntu.com/security/notices/USN-7028-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6997 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6997"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7007-3 vom 2024-09-23",
"url": "https://ubuntu.com/security/notices/USN-7007-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3383-1 vom 2024-09-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019497.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6999-2 vom 2024-09-23",
"url": "https://ubuntu.com/security/notices/USN-6999-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6993 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6993"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7029-1 vom 2024-09-23",
"url": "https://ubuntu.com/security/notices/USN-7029-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7021-2 vom 2024-09-23",
"url": "https://ubuntu.com/security/notices/USN-7021-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7009-2 vom 2024-09-25",
"url": "https://ubuntu.com/security/notices/USN-7009-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-6997 vom 2024-09-26",
"url": "https://linux.oracle.com/errata/ELSA-2024-6997.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-7000 vom 2024-09-26",
"url": "https://linux.oracle.com/errata/ELSA-2024-7000.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7003-4 vom 2024-09-26",
"url": "https://ubuntu.com/security/notices/USN-7003-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7021-3 vom 2024-09-26",
"url": "https://ubuntu.com/security/notices/USN-7021-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7039-1 vom 2024-09-26",
"url": "https://ubuntu.com/security/notices/USN-7039-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3483-1 vom 2024-09-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2HO244EHQ65DPDJ2NOBAXLG7QYWSCUMA/"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:7001 vom 2024-09-30",
"url": "https://errata.build.resf.org/RLSA-2024:7001"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7022-2 vom 2024-10-01",
"url": "https://ubuntu.com/security/notices/USN-7022-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7003-5 vom 2024-10-01",
"url": "https://ubuntu.com/security/notices/USN-7003-5"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7490 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:7490"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7489 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:7489"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7021-4 vom 2024-10-03",
"url": "https://ubuntu.com/security/notices/USN-7021-4"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3912 vom 2024-10-07",
"url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00003.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019562.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3551-1 vom 2024-10-08",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/Q7MIMQMCXNGMVS32KLTADYTPQCKF5HWU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3553-1 vom 2024-10-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019560.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3569-1 vom 2024-10-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6GBL67LQ3MUSYQCQRQH2AZH3XWILTO5A/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3566-1 vom 2024-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019578.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3561-1 vom 2024-10-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LSUY4BSWS5WR46CHS4FPBIJIRLKHRDHV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3559-1 vom 2024-10-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019575.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3564-1 vom 2024-10-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R7FS3QARF7WUPH5GFL22NW3G3SDO2C7Z/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7022-3 vom 2024-10-10",
"url": "https://ubuntu.com/security/notices/USN-7022-3"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-422 vom 2024-10-10",
"url": "https://www.dell.com/support/kbdoc/de-de/000234730/dsa-2024-422-security-update-for-dell-networker-vproxy-multiple-component-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3587-1 vom 2024-10-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019588.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3591-1 vom 2024-10-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019587.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3592-1 vom 2024-10-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019589.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8107 vom 2024-10-15",
"url": "https://access.redhat.com/errata/RHSA-2024:8107"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3617-1 vom 2024-10-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019595.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12779 vom 2024-10-14",
"url": "https://linux.oracle.com/errata/ELSA-2024-12779.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8162 vom 2024-10-16",
"url": "https://access.redhat.com/errata/RHSA-2024:8162"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7069-1 vom 2024-10-16",
"url": "https://ubuntu.com/security/notices/USN-7069-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8162 vom 2024-10-16",
"url": "https://linux.oracle.com/errata/ELSA-2024-8162.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7028-2 vom 2024-10-17",
"url": "https://ubuntu.com/security/notices/USN-7028-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7069-2 vom 2024-10-17",
"url": "https://ubuntu.com/security/notices/USN-7069-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23",
"url": "https://access.redhat.com/errata/RHSA-2024:8318"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:8162 vom 2024-10-25",
"url": "https://errata.build.resf.org/RLSA-2024:8162"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3767-1 vom 2024-10-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019682.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3768-1 vom 2024-10-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019681.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3782-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019695.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3783-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JBARQYJ6M5ZO2ZPYF6F55DX3BXLKEQMT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3783-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JBARQYJ6M5ZO2ZPYF6F55DX3BXLKEQMT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3780-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZRFC54YJNAIE647NXDXGDHFV6UDF5EPM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3780-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ZRFC54YJNAIE647NXDXGDHFV6UDF5EPM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3774-1 vom 2024-10-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019686.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3779-1 vom 2024-10-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DKYHT4QW67UZKMENITQO7T5OANUXGOIM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3777-1 vom 2024-10-29",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EZDCNRY3OUDL3J55URFZK4CF6EMUGZ5C/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3836-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/766TFTKXVWJJPZQXXTFUC5YHPETQW3AH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3800-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019714.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3796-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019700.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3833-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/46CHUG3NHK74I7NL4E3MYL6M7O72UAE6/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3805-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6AZ2YKRZXCGZLO3DU6DW532FYLNVDCGU/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3797-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019699.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3831-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QK6PZZGVJB6TX4W6LKJNJW74SGTITNGD/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3815-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/JIUM76237NQIAK3CP7ENKHD5EOEBDHZH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3814-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/QW54KPSGGX7Q3N4CIMSAGZRZY4WGZV2D/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3830-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/5FIXDPPFE66BKRWS3X45YHODJJ57FQRT/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3798-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019698.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3837-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VHXZ2BQRCVWQY2AVSULS6AN56SITZ273/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3793-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019702.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3806-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/I22FOLEFZIBTJBTIPHH5GXPKMIXVDSDI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3824-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S6IC3XKGED2IZ3RSTDHSMPUKMPV4R4FC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3803-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3799-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019703.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3794-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019701.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3804-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GZWABRNLCUO6HRO6LFOXTIBDSFGOTSYD/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3829-1 vom 2024-10-30",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RMOWLUMWUZKBWNWZRVPCJY43YUOMCMJ7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3838-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IVMUBWV57LJO735WTA67PNJDTJXS5OOY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3842-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VVJDY73ZQLYG6XTLPXQKV6DOXIBCWQNH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3840-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/O2CG2OGLBEZR2LX5UI6PTT5NVZOFNGQH/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7021-5 vom 2024-10-31",
"url": "https://ubuntu.com/security/notices/USN-7021-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3848-1 vom 2024-10-31",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019743.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3859-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/I2YJKGZHLOSZMF6JYHDKXI5OARZUMTEY/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3849-1 vom 2024-10-31",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3857-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DM3QIZHKHG7AW6EAKKMMWCCUOYK4JU3R/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3850-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KSMKB243YKTE3C2SGCFXBMVAT6CUYWVH/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-1 vom 2024-10-31",
"url": "https://ubuntu.com/security/notices/USN-7088-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3852-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CJCHUFTBOJTQRE24NTRP6WMCK5BGPZ3N/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3851-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/7YDAYBSAUUUZVVIKYWRRX5O6ZCOQ2K46/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3854-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/6DKQ4KINQ5TXHK6JA63O3YINMJXE2QVJ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3860-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/UFUASUPHAEZFWXKIMGZLIZD4LHGMJ5YW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3856-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2LSLV3QQQYIAV376IANSLYZETKMXDLVZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3855-1 vom 2024-10-31",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HVT4PHTMBZOBVPW2CI26GVIVJNWCBTVN/"
},
{
"category": "external",
"summary": "IBM Security Bulletin",
"url": "https://www.ibm.com/support/pages/node/7174634"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8870 vom 2024-11-05",
"url": "https://access.redhat.com/errata/RHSA-2024:8870"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8856 vom 2024-11-05",
"url": "https://access.redhat.com/errata/RHSA-2024:8856"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-2 vom 2024-11-04",
"url": "https://ubuntu.com/security/notices/USN-7088-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8856 vom 2024-11-06",
"url": "https://linux.oracle.com/errata/ELSA-2024-8856.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-3 vom 2024-11-06",
"url": "https://ubuntu.com/security/notices/USN-7088-3"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:8870 vom 2024-11-08",
"url": "https://errata.build.resf.org/RLSA-2024:8870"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7100-1 vom 2024-11-11",
"url": "https://ubuntu.com/security/notices/USN-7100-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7100-2 vom 2024-11-12",
"url": "https://ubuntu.com/security/notices/USN-7100-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9315 vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9315"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12815 vom 2024-11-13",
"url": "https://linux.oracle.com/errata/ELSA-2024-12815.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3986-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/CIC23R3UQSPF2K4P2CX54TPCX5T7KWQG/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9546 vom 2024-11-13",
"url": "https://access.redhat.com/errata/RHSA-2024:9546"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3984-1 vom 2024-11-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/L52VEDNTEHWEPR56WZN4KZNMEUYGCJX6/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7110-1 vom 2024-11-14",
"url": "https://ubuntu.com/security/notices/USN-7110-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7088-5 vom 2024-11-14",
"url": "https://ubuntu.com/security/notices/USN-7088-5"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4038-1 vom 2024-11-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019838.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7121-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7121-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7119-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7119-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7123-1 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7123-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7121-2 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7121-2"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5818 vom 2024-11-24",
"url": "https://lists.debian.org/debian-security-announce/2024/msg00233.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7121-3 vom 2024-11-25",
"url": "https://ubuntu.com/security/notices/USN-7121-3"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10262 vom 2024-11-26",
"url": "https://access.redhat.com/errata/RHSA-2024:10262"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10282 vom 2024-11-26",
"url": "https://access.redhat.com/errata/RHSA-2024:10282"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10281 vom 2024-11-26",
"url": "https://access.redhat.com/errata/RHSA-2024:10281"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4103-1 vom 2024-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019863.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4100-1 vom 2024-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019864.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4122-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019885.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4128-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019880.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4124-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019883.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4125-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019882.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4123-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019884.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4127-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019881.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4140-1 vom 2024-12-02",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019890.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10771 vom 2024-12-04",
"url": "https://access.redhat.com/errata/RHSA-2024:10771"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4161-1 vom 2024-12-04",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/R6RFOLIFPTX44BLCDCF6HLSN7S4I4YXH/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4180-1 vom 2024-12-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/3ACAYSLQECATBMYSIXEOONW3SJQYVWGD/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4207-1 vom 2024-12-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KHOJJYPB3I2C5FKMLHD5WFCQI342KAXA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4218-1 vom 2024-12-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/4UVNDL3CU4NHVPE7QELR2N5HRCDSMYEV/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12851 vom 2024-12-05",
"url": "http://linux.oracle.com/errata/ELSA-2024-12851.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4216-1 vom 2024-12-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/KZC5ZXKVE5JSNEKEAICAO52WN7SOJCTX/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4214-1 vom 2024-12-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/P4UZ4KLYIQHACIYR7LE2ANITUCPLWFYS/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4235-1 vom 2024-12-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LIMMCWFWYJUMJTABZZ7ZEYXOOVE5BZY7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4242-1 vom 2024-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019958.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4256-1 vom 2024-12-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/34BVCDIDBQSXQ6Y3TVDGD4FSZ7N3D3LI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4243-1 vom 2024-12-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/GDL3TRRFKGYVQIW7MMTUJS76GCW7B3JZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4248-1 vom 2024-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019954.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4228-1 vom 2024-12-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SUCQUP757AUWMZNCNQ2DGQICEYBRZUIC/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4250-1 vom 2024-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4246-1 vom 2024-12-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/3LFFLGXO55CBY4WD74GYLL6CL2HWJM2Q/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4236-1 vom 2024-12-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ODASOBSBN3UUGHNO44MK2K4MC35CPLXJ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4234-1 vom 2024-12-06",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/B6RMLGICBLD3BNXSBS7J23W3GCEJMFJA/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4231-1 vom 2024-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019946.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4263-1 vom 2024-12-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019971.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4264-1 vom 2024-12-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SZPUHL7SUZ57L3OJFO25IHYVDJ76ONGC/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7144-1 vom 2024-12-09",
"url": "https://ubuntu.com/security/notices/USN-7144-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4266-1 vom 2024-12-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RRJRAM3LFR4MNOHCFB2XIOS6OJUDNUPE/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4262-1 vom 2024-12-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AF5MYHVYCHCM3AIO34JSXWJNP2WUCOHS/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10946 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10946"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2024-0016 vom 2024-12-10",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2024-December/001104.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7148-1 vom 2024-12-10",
"url": "https://ubuntu.com/security/notices/USN-7148-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10945 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10945"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4275-1 vom 2024-12-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YTZ2WGLML4Q6E3IG32UCJ6NFIDUTWN22/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4275-1 vom 2024-12-10",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YTZ2WGLML4Q6E3IG32UCJ6NFIDUTWN22/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-1 vom 2024-12-12",
"url": "https://ubuntu.com/security/notices/USN-7159-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4315-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/LQPWDP54GSTHYCV4CTCOE67D2ANVPPUW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4314-1 vom 2024-12-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SARXL66CQHD5VSFG5PUBNBVBPVFUN4KT/"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7179045 vom 2024-12-16",
"url": "https://www.ibm.com/support/pages/node/7179045"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18",
"url": "https://ubuntu.com/security/notices/USN-7166-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7173-1 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7173-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-18",
"url": "https://ubuntu.com/security/notices/USN-7159-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-2 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7159-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7166-1 vom 2024-12-17",
"url": "https://ubuntu.com/security/notices/USN-7166-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4364-1 vom 2024-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020028.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12887 vom 2024-12-18",
"url": "https://linux.oracle.com/errata/ELSA-2024-12887.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4376-1 vom 2024-12-18",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WFOJHFFEHK42VPQ6XLZWB77H5OEJ3FF4/"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:10282 vom 2024-12-19",
"url": "https://errata.build.resf.org/RLSA-2024:10282"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11486 vom 2024-12-19",
"url": "https://access.redhat.com/errata/RHSA-2024:11486"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2024-059 vom 2024-12-19",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-059.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2024-074 vom 2024-12-19",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-074.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2024-088 vom 2024-12-19",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-088.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7166-3 vom 2024-12-20",
"url": "https://ubuntu.com/security/notices/USN-7166-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7179-1 vom 2024-12-20",
"url": "https://ubuntu.com/security/notices/USN-7179-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-4 vom 2024-12-20",
"url": "https://ubuntu.com/security/notices/USN-7159-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7173-2 vom 2024-12-20",
"url": "https://ubuntu.com/security/notices/USN-7173-2"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4008 vom 2025-01-03",
"url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7179-2 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7179-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7186-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7186-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7184-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7184-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-11486 vom 2025-01-07",
"url": "https://linux.oracle.com/errata/ELSA-2024-11486.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7183-1 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7183-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7159-5 vom 2025-01-06",
"url": "https://ubuntu.com/security/notices/USN-7159-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7179-3 vom 2025-01-07",
"url": "https://ubuntu.com/security/notices/USN-7179-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0034-1 vom 2025-01-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020071.html"
},
{
"category": "external",
"summary": "Juniper Security Advisory JSA92874 vom 2024-01-09",
"url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7185-2 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7185-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7195-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7195-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7186-2 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7186-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7194-1 vom 2025-01-09",
"url": "https://ubuntu.com/security/notices/USN-7194-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-9315 vom 2025-01-13",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-January/017000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0106-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020113.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0105-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020114.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0107-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020112.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7195-2 vom 2025-01-14",
"url": "https://ubuntu.com/security/notices/USN-7195-2"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0109-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020110.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0101-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0114-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YC7MKFCHLBJHUQM2SLPOGVG4DUWP2J4E/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0111-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/2IXCN5JTEUUWORLKQVOQYQKMHTJ73CSG/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0115-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VK2D63Q2FKHJWXOLVAS7HPIWURVL3MQQ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0110-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/PLWCG227VUGPKNXHW6FOCW727UUPVLLU/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7173-3 vom 2025-01-15",
"url": "https://ubuntu.com/security/notices/USN-7173-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0124-1 vom 2025-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020125.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0131-1 vom 2025-01-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/NVEFJ5TKVGVJIR3Y7Y6XQIAGC5P5TTK7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0138-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/ET3TDUWYDTZV554NRC7LB5HGM4TCIIGZ/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0150-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/USHZQFRYGMLVCVQRQLPH4FARDBDAEC6G/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0137-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YHBMZ4MND2ONRG4N26VJNJGAZBXMYEDV/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0146-1 vom 2025-01-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/C6ANXHEO54VUUFEWI6QYB2M3L2SS7OOW/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0158-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020154.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0164-1 vom 2025-01-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020153.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0239-1 vom 2025-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VBKJOKHJGUZRHPVCGSRZVBF6ZMI7KJY7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0238-1 vom 2025-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YNU4IXTEAXCI7QNPC2AVXZICYTGC4XXI/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0240-1 vom 2025-01-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/YCBYAV5OJRXD362FDCZUSIHNHOURONCF/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0236-1 vom 2025-01-24",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020196.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0249-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020217.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7179-4 vom 2025-01-27",
"url": "https://ubuntu.com/security/notices/USN-7179-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0254-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020213.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0253-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020214.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0264-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020207.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0261-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020210.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0244-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020222.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0262-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020209.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0248-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020218.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0243-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020205.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0255-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020212.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0251-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020216.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0266-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020223.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0263-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020208.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0252-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020215.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0265-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020224.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0260-1 vom 2025-01-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020211.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7233-1 vom 2025-01-28",
"url": "https://ubuntu.com/security/notices/USN-7233-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0269-1 vom 2025-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020226.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0268-1 vom 2025-01-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020227.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7181933 vom 2025-01-29",
"url": "https://www.ibm.com/support/pages/node/7181933"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7233-2 vom 2025-01-30",
"url": "https://ubuntu.com/security/notices/USN-7233-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7233-3 vom 2025-02-03",
"url": "https://ubuntu.com/security/notices/USN-7233-3"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7182335 vom 2025-02-03",
"url": "https://www.ibm.com/support/pages/node/7182335"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7262-1 vom 2025-02-10",
"url": "https://ubuntu.com/security/notices/USN-7262-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20095 vom 2025-02-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-20095.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20100 vom 2025-02-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-20100.html"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2025-2889 vom 2025-02-13",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25416"
},
{
"category": "external",
"summary": "Brocade Security Advisory BSA-2025-2895 vom 2025-02-13",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25398"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0556-1 vom 2025-02-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020352.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0577-1 vom 2025-02-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020370.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7262-2 vom 2025-02-24",
"url": "https://ubuntu.com/security/notices/USN-7262-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7294-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7295-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7295-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-2 vom 2025-02-27",
"url": "https://ubuntu.com/security/notices/USN-7294-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-3 vom 2025-02-28",
"url": "https://ubuntu.com/security/notices/USN-7294-3"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4075 vom 2025-03-01",
"url": "https://lists.debian.org/debian-lts-announce/2025/03/msg00002.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7294-4 vom 2025-03-03",
"url": "https://ubuntu.com/security/notices/USN-7294-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7332-1 vom 2025-03-05",
"url": "https://ubuntu.com/security/notices/USN-7332-1"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7185244 vom 2025-03-10",
"url": "https://www.ibm.com/support/pages/node/7185244"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0577-2 vom 2025-03-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020500.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7332-2 vom 2025-03-11",
"url": "https://ubuntu.com/security/notices/USN-7332-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7344-1 vom 2025-03-11",
"url": "https://ubuntu.com/security/notices/USN-7344-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7342-1 vom 2025-03-11",
"url": "https://ubuntu.com/security/notices/USN-7342-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7332-3 vom 2025-03-13",
"url": "https://ubuntu.com/security/notices/USN-7332-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7344-2 vom 2025-03-13",
"url": "https://ubuntu.com/security/notices/USN-7344-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20190 vom 2025-03-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-20190.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice LSN-0110-1 vom 2025-03-26",
"url": "https://ubuntu.com/security/notices/LSN-0110-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7393-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7393-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7391-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7391-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-1 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7392-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-2 vom 2025-03-28",
"url": "https://ubuntu.com/security/notices/USN-7392-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7401-1 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7401-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-3 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7392-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7392-4 vom 2025-04-01",
"url": "https://ubuntu.com/security/notices/USN-7392-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7413-1 vom 2025-04-03",
"url": "https://ubuntu.com/security/notices/USN-7413-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1178-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020674.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1177-1 vom 2025-04-08",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020670.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1180-1 vom 2025-04-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/DGJ23MSZWYIA7MJ47RNVV6T27Z324VKA/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-2 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7429-1 vom 2025-04-09",
"url": "https://ubuntu.com/security/notices/USN-7429-1"
},
{
"category": "external",
"summary": "Juniper Security Bulletin",
"url": "https://supportportal.juniper.net/s/article/2025-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R2-release?language=en_US"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5900 vom 2025-04-12",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00062.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20271 vom 2025-04-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-20271.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1293-1 vom 2025-04-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020712.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7463-1 vom 2025-04-24",
"url": "https://ubuntu.com/security/notices/USN-7463-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4342 vom 2025-04-30",
"url": "https://access.redhat.com/errata/RHSA-2025:4342"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-2 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-3 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-1 vom 2025-05-12",
"url": "https://ubuntu.com/security/notices/USN-7506-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7506-4 vom 2025-05-13",
"url": "https://ubuntu.com/security/notices/USN-7506-4"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:6966 vom 2025-05-13",
"url": "https://access.redhat.com/errata/RHSA-2025:6966"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-2 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7513-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7514-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7514-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7515-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7515-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-1 vom 2025-05-16",
"url": "https://ubuntu.com/security/notices/USN-7513-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-3 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7513-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7522-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7522-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7523-1 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7523-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7515-2 vom 2025-05-20",
"url": "https://ubuntu.com/security/notices/USN-7515-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7524-1 vom 2025-05-26",
"url": "https://ubuntu.com/security/notices/USN-7524-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4178 vom 2025-05-26",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7540-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7540-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7539-1 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7539-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-4 vom 2025-05-28",
"url": "https://ubuntu.com/security/notices/USN-7513-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7513-5 vom 2025-05-29",
"url": "https://ubuntu.com/security/notices/USN-7513-5"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4193 vom 2025-05-30",
"url": "https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-072 vom 2025-05-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-072.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-213 vom 2025-05-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20246-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021078.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20247-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021076.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20260-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021058.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20270-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021056.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20164-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021175.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20192-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021150.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20190-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021154.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20163-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021187.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20073-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021282.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20077-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021265.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20028-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021386.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20044-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021334.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20008-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021403.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.15-2025-073 vom 2025-06-10",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2025-073.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20372 vom 2025-06-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-20372.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01919-1 vom 2025-06-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01951-1 vom 2025-06-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021509.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:01967-1 vom 2025-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.10-2025-095 vom 2025-06-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2025-095.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-103 vom 2025-06-24",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-103.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2KERNEL-5.4-2025-103 vom 2025-06-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2KERNEL-5.4-2025-103.html"
},
{
"category": "external",
"summary": "SEM 2025.2.1 release notes vom 2025-07-02",
"url": "https://documentation.solarwinds.com/en/success_center/sem/content/release_notes/sem_2025-2-1_release_notes.htm"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-2 vom 2025-07-02",
"url": "https://ubuntu.com/security/notices/USN-7607-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-1 vom 2025-07-01",
"url": "https://ubuntu.com/security/notices/USN-7607-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20406 vom 2025-07-08",
"url": "https://linux.oracle.com/errata/ELSA-2025-20406.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7607-3 vom 2025-07-09",
"url": "https://ubuntu.com/security/notices/USN-7607-3"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02264-1 vom 2025-07-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021785.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02322-1 vom 2025-07-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021810.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02321-1 vom 2025-07-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021811.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20470 vom 2025-07-16",
"url": "https://linux.oracle.com/errata/ELSA-2025-20470.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02334-1 vom 2025-07-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021829.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-1 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-3 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-2 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7654-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7655-1 vom 2025-07-18",
"url": "https://ubuntu.com/security/notices/USN-7655-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-4 vom 2025-07-22",
"url": "https://ubuntu.com/security/notices/USN-7654-4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02537-1 vom 2025-07-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021978.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7654-5 vom 2025-07-29",
"url": "https://ubuntu.com/security/notices/USN-7654-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-3 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-4 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7685-4"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7686-1 vom 2025-08-05",
"url": "https://ubuntu.com/security/notices/USN-7686-1"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20521 vom 2025-08-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-20521.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7685-5 vom 2025-08-13",
"url": "https://ubuntu.com/security/notices/USN-7685-5"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-1 vom 2025-08-19",
"url": "https://ubuntu.com/security/notices/USN-7701-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-2 vom 2025-08-20",
"url": "https://ubuntu.com/security/notices/USN-7701-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7701-3 vom 2025-08-21",
"url": "https://ubuntu.com/security/notices/USN-7701-3"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7712-1 vom 2025-08-22",
"url": "https://ubuntu.com/security/notices/USN-7712-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7711-1 vom 2025-08-22",
"url": "https://ubuntu.com/security/notices/USN-7711-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7712-2 vom 2025-09-02",
"url": "https://ubuntu.com/security/notices/USN-7712-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-20553 vom 2025-09-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-20553.html"
},
{
"category": "external",
"summary": "Dell Security Update vom 2025-10-02",
"url": "https://www.dell.com/support/kbdoc/000376224"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7797-1 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7797-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7797-2 vom 2025-10-02",
"url": "https://ubuntu.com/security/notices/USN-7797-2"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4327 vom 2025-10-13",
"url": "https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7819-1 vom 2025-10-13",
"url": "https://ubuntu.com/security/notices/USN-7819-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7832-1 vom 2025-10-21",
"url": "https://ubuntu.com/security/notices/USN-7832-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7819-2 vom 2025-10-22",
"url": "https://ubuntu.com/security/notices/USN-7819-2"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-404 vom 2025-10-31",
"url": "https://www.dell.com/support/kbdoc/000385435"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7865-1 vom 2025-11-10",
"url": "https://ubuntu.com/security/notices/USN-7865-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:2264-1 vom 2025-11-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:0149-1 vom 2026-01-19",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20325-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024170.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20285-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024199.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20291-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024195.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20283-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024201.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20319-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024176.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20322-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024173.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20320-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024175.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20323-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024172.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20294-1 vom 2026-02-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-February/024193.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff",
"tracking": {
"current_release_date": "2026-02-16T23:00:00.000+00:00",
"generator": {
"date": "2026-02-17T09:10:44.923+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2024-1418",
"initial_release_date": "2024-06-19T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-06-19T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-06-27T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-07-09T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-07-14T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-15T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat und Debian aufgenommen"
},
{
"date": "2024-07-16T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat und Debian aufgenommen"
},
{
"date": "2024-07-18T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2024-07-22T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-07-24T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-28T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-07-29T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-30T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-31T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und Oracle Linux aufgenommen"
},
{
"date": "2024-08-06T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-07T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-08T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-08-11T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-08-12T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2024-08-13T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE, Ubuntu und Amazon aufgenommen"
},
{
"date": "2024-08-14T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2024-08-15T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-18T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-19T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-08-20T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Amazon und Red Hat aufgenommen"
},
{
"date": "2024-08-21T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Rocky Enterprise Software Foundation, Ubuntu, Red Hat und Amazon aufgenommen"
},
{
"date": "2024-08-22T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-08-28T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-29T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-09-03T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-04T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-10T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2024-09-11T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Oracle Linux, Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-09-12T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-09-15T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-09-16T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von SUSE und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-09-17T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-18T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-09-22T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-09-23T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von Red Hat, Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-09-24T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-09-25T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-09-26T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-09-29T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-30T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-10-01T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2024-10-03T22:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-10-07T22:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-10-08T22:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-09T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2024-10-10T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-14T22:00:00.000+00:00",
"number": "52",
"summary": "Neue Updates von Red Hat, SUSE und Oracle Linux aufgenommen"
},
{
"date": "2024-10-15T22:00:00.000+00:00",
"number": "53",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2024-10-16T22:00:00.000+00:00",
"number": "54",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-10-17T22:00:00.000+00:00",
"number": "55",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-10-23T22:00:00.000+00:00",
"number": "56",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-27T23:00:00.000+00:00",
"number": "57",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-10-28T23:00:00.000+00:00",
"number": "58",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-29T23:00:00.000+00:00",
"number": "59",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-30T23:00:00.000+00:00",
"number": "60",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "61",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2024-11-04T23:00:00.000+00:00",
"number": "62",
"summary": "Neue Updates von Red Hat und Ubuntu aufgenommen"
},
{
"date": "2024-11-05T23:00:00.000+00:00",
"number": "63",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-11-10T23:00:00.000+00:00",
"number": "64",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "65",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "66",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2024-11-13T23:00:00.000+00:00",
"number": "67",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2024-11-14T23:00:00.000+00:00",
"number": "68",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-19T23:00:00.000+00:00",
"number": "69",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "70",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-11-24T23:00:00.000+00:00",
"number": "71",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-11-25T23:00:00.000+00:00",
"number": "72",
"summary": "Neue Updates von Ubuntu und Red Hat aufgenommen"
},
{
"date": "2024-11-28T23:00:00.000+00:00",
"number": "73",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-02T23:00:00.000+00:00",
"number": "74",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-03T23:00:00.000+00:00",
"number": "75",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2024-12-04T23:00:00.000+00:00",
"number": "76",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-05T23:00:00.000+00:00",
"number": "77",
"summary": "Neue Updates von SUSE und Oracle Linux aufgenommen"
},
{
"date": "2024-12-08T23:00:00.000+00:00",
"number": "78",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-09T23:00:00.000+00:00",
"number": "79",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2024-12-10T23:00:00.000+00:00",
"number": "80",
"summary": "Neue Updates von Red Hat, ORACLE, Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-12-12T23:00:00.000+00:00",
"number": "81",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2024-12-15T23:00:00.000+00:00",
"number": "82",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-16T23:00:00.000+00:00",
"number": "83",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-12-17T23:00:00.000+00:00",
"number": "84",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2024-12-18T23:00:00.000+00:00",
"number": "85",
"summary": "Neue Updates von SUSE, Oracle Linux, Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2024-12-19T23:00:00.000+00:00",
"number": "86",
"summary": "Neue Updates von Amazon und SUSE aufgenommen"
},
{
"date": "2024-12-22T23:00:00.000+00:00",
"number": "87",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-02T23:00:00.000+00:00",
"number": "88",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-01-06T23:00:00.000+00:00",
"number": "89",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-01-07T23:00:00.000+00:00",
"number": "90",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-08T23:00:00.000+00:00",
"number": "91",
"summary": "Neue Updates von SUSE und Juniper aufgenommen"
},
{
"date": "2025-01-09T23:00:00.000+00:00",
"number": "92",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-13T23:00:00.000+00:00",
"number": "93",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "94",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-01-15T23:00:00.000+00:00",
"number": "95",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-01-16T23:00:00.000+00:00",
"number": "96",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-19T23:00:00.000+00:00",
"number": "97",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-26T23:00:00.000+00:00",
"number": "98",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-27T23:00:00.000+00:00",
"number": "99",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-01-28T23:00:00.000+00:00",
"number": "100",
"summary": "Neue Updates von Ubuntu und SUSE aufgenommen"
},
{
"date": "2025-01-29T23:00:00.000+00:00",
"number": "101",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-01-30T23:00:00.000+00:00",
"number": "102",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-03T23:00:00.000+00:00",
"number": "103",
"summary": "Neue Updates von Ubuntu und IBM aufgenommen"
},
{
"date": "2025-02-10T23:00:00.000+00:00",
"number": "104",
"summary": "Neue Updates von Ubuntu und Oracle Linux aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "105",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-13T23:00:00.000+00:00",
"number": "106",
"summary": "Neue Updates von BROCADE aufgenommen"
},
{
"date": "2025-02-16T23:00:00.000+00:00",
"number": "107",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "108",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-24T23:00:00.000+00:00",
"number": "109",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-25T23:00:00.000+00:00",
"number": "110",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-27T23:00:00.000+00:00",
"number": "111",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-02T23:00:00.000+00:00",
"number": "112",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-03-03T23:00:00.000+00:00",
"number": "113",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-05T23:00:00.000+00:00",
"number": "114",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-10T23:00:00.000+00:00",
"number": "115",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-03-11T23:00:00.000+00:00",
"number": "116",
"summary": "Neue Updates von SUSE und Ubuntu aufgenommen"
},
{
"date": "2025-03-12T23:00:00.000+00:00",
"number": "117",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-20T23:00:00.000+00:00",
"number": "118",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-03-26T23:00:00.000+00:00",
"number": "119",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-30T22:00:00.000+00:00",
"number": "120",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-01T22:00:00.000+00:00",
"number": "121",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-03T22:00:00.000+00:00",
"number": "122",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-08T22:00:00.000+00:00",
"number": "123",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "124",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-10T22:00:00.000+00:00",
"number": "125",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-04-13T22:00:00.000+00:00",
"number": "126",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-04-14T22:00:00.000+00:00",
"number": "127",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-04-15T22:00:00.000+00:00",
"number": "128",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-24T22:00:00.000+00:00",
"number": "129",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "130",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "131",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-13T22:00:00.000+00:00",
"number": "132",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-18T22:00:00.000+00:00",
"number": "133",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-20T22:00:00.000+00:00",
"number": "134",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-26T22:00:00.000+00:00",
"number": "135",
"summary": "Neue Updates von Ubuntu und Debian aufgenommen"
},
{
"date": "2025-05-27T22:00:00.000+00:00",
"number": "136",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-05-29T22:00:00.000+00:00",
"number": "137",
"summary": "Neue Updates von Ubuntu, Debian und Amazon aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "138",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "139",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-09T22:00:00.000+00:00",
"number": "140",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-06-11T22:00:00.000+00:00",
"number": "141",
"summary": "Neue Updates von Oracle Linux und SUSE aufgenommen"
},
{
"date": "2025-06-15T22:00:00.000+00:00",
"number": "142",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-16T22:00:00.000+00:00",
"number": "143",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-23T22:00:00.000+00:00",
"number": "144",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "145",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-07-01T22:00:00.000+00:00",
"number": "146",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-08T22:00:00.000+00:00",
"number": "147",
"summary": "Neue Updates von Oracle Linux und Ubuntu aufgenommen"
},
{
"date": "2025-07-10T22:00:00.000+00:00",
"number": "148",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-15T22:00:00.000+00:00",
"number": "149",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-16T22:00:00.000+00:00",
"number": "150",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-17T22:00:00.000+00:00",
"number": "151",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-21T22:00:00.000+00:00",
"number": "152",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-28T22:00:00.000+00:00",
"number": "153",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-29T22:00:00.000+00:00",
"number": "154",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-07-31T22:00:00.000+00:00",
"number": "155",
"summary": "Referenz(en) aufgenommen:"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "156",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-05T22:00:00.000+00:00",
"number": "157",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-11T22:00:00.000+00:00",
"number": "158",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "159",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "160",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-20T22:00:00.000+00:00",
"number": "161",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "162",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-02T22:00:00.000+00:00",
"number": "163",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "164",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "165",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-10-05T22:00:00.000+00:00",
"number": "166",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-12T22:00:00.000+00:00",
"number": "167",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-10-13T22:00:00.000+00:00",
"number": "168",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "169",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-30T23:00:00.000+00:00",
"number": "170",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-11-09T23:00:00.000+00:00",
"number": "171",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-11-11T23:00:00.000+00:00",
"number": "172",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-19T23:00:00.000+00:00",
"number": "173",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-15T23:00:00.000+00:00",
"number": "174",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-02-16T23:00:00.000+00:00",
"number": "175",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "175"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Broadcom Brocade SANnav",
"product": {
"name": "Broadcom Brocade SANnav",
"product_id": "T034392",
"product_identification_helper": {
"cpe": "cpe:/a:broadcom:brocade_sannav:-"
}
}
}
],
"category": "vendor",
"name": "Broadcom"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Avamar",
"product": {
"name": "Dell Avamar",
"product_id": "T039664",
"product_identification_helper": {
"cpe": "cpe:/a:dell:avamar:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T034583",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual"
}
}
},
{
"category": "product_version",
"name": "Virtual Edition",
"product": {
"name": "Dell NetWorker Virtual Edition",
"product_id": "T048226",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual_edition"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.4.0.0",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.4.0.0",
"product_id": "T045879"
}
},
{
"category": "product_version",
"name": "8.4.0.0",
"product": {
"name": "Dell PowerProtect Data Domain 8.4.0.0",
"product_id": "T045879-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.4.0.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.10.1.70",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.10.1.70",
"product_id": "T045881"
}
},
{
"category": "product_version",
"name": "7.10.1.70",
"product": {
"name": "Dell PowerProtect Data Domain 7.10.1.70",
"product_id": "T045881-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.70"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.13.1.40",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.13.1.40",
"product_id": "T047343"
}
},
{
"category": "product_version",
"name": "7.13.1.40",
"product": {
"name": "Dell PowerProtect Data Domain 7.13.1.40",
"product_id": "T047343-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.40"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.3.1.10",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.3.1.10",
"product_id": "T047344"
}
},
{
"category": "product_version",
"name": "8.3.1.10",
"product": {
"name": "Dell PowerProtect Data Domain 8.3.1.10",
"product_id": "T047344-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.1.10"
}
}
}
],
"category": "product_name",
"name": "PowerProtect Data Domain"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM InfoSphere Guardium",
"product": {
"name": "IBM InfoSphere Guardium",
"product_id": "T002366",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:infosphere_guardium:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP10 IF01",
"product_id": "T038741"
}
},
{
"category": "product_version",
"name": "7.5.0 UP10 IF01",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP10 IF01",
"product_id": "T038741-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up10_if01"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP11",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP11",
"product_id": "T040749"
}
},
{
"category": "product_version",
"name": "7.5.0 UP11",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP11",
"product_id": "T040749-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"branches": [
{
"category": "product_version",
"name": "12",
"product": {
"name": "IBM Security Guardium 12.0",
"product_id": "T031092",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:12.0"
}
}
}
],
"category": "product_name",
"name": "Security Guardium"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.1.9.5",
"product": {
"name": "IBM Storage Scale \u003c6.1.9.5",
"product_id": "T039851"
}
},
{
"category": "product_version",
"name": "6.1.9.5",
"product": {
"name": "IBM Storage Scale 6.1.9.5",
"product_id": "T039851-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_scale:6.1.9.5"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.2.2.0",
"product": {
"name": "IBM Storage Scale \u003c6.2.2.0",
"product_id": "T039852"
}
},
{
"category": "product_version",
"name": "6.2.2.0",
"product": {
"name": "IBM Storage Scale 6.2.2.0",
"product_id": "T039852-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_scale:6.2.2.0"
}
}
}
],
"category": "product_name",
"name": "Storage Scale"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c24.1R2",
"product": {
"name": "Juniper Junos Space \u003c24.1R2",
"product_id": "T040074"
}
},
{
"category": "product_version",
"name": "24.1R2",
"product": {
"name": "Juniper Junos Space 24.1R2",
"product_id": "T040074-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:juniper:junos_space:24.1r2"
}
}
}
],
"category": "product_name",
"name": "Junos Space"
}
],
"category": "vendor",
"name": "Juniper"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T035582",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T042774",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "product_name",
"name": "Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "3",
"product": {
"name": "Oracle VM 3",
"product_id": "T030927",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:vm:3"
}
}
}
],
"category": "product_name",
"name": "VM"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager \u003c2025.2.1",
"product_id": "T044986"
}
},
{
"category": "product_version",
"name": "2025.2.1",
"product": {
"name": "SolarWinds Security Event Manager 2025.2.1",
"product_id": "T044986-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:solarwinds:security_event_manager:2025.2.1"
}
}
}
],
"category": "product_name",
"name": "Security Event Manager"
}
],
"category": "vendor",
"name": "SolarWinds"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-47573",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47573"
},
{
"cve": "CVE-2021-47574",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47574"
},
{
"cve": "CVE-2021-47575",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47575"
},
{
"cve": "CVE-2021-47576",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47576"
},
{
"cve": "CVE-2021-47577",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47577"
},
{
"cve": "CVE-2021-47578",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47578"
},
{
"cve": "CVE-2021-47579",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47579"
},
{
"cve": "CVE-2021-47580",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47580"
},
{
"cve": "CVE-2021-47581",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47581"
},
{
"cve": "CVE-2021-47582",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47582"
},
{
"cve": "CVE-2021-47583",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47583"
},
{
"cve": "CVE-2021-47584",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47584"
},
{
"cve": "CVE-2021-47585",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47585"
},
{
"cve": "CVE-2021-47586",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47586"
},
{
"cve": "CVE-2021-47587",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47587"
},
{
"cve": "CVE-2021-47588",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47588"
},
{
"cve": "CVE-2021-47589",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47589"
},
{
"cve": "CVE-2021-47590",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47590"
},
{
"cve": "CVE-2021-47591",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47591"
},
{
"cve": "CVE-2021-47592",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47592"
},
{
"cve": "CVE-2021-47593",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47593"
},
{
"cve": "CVE-2021-47594",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47594"
},
{
"cve": "CVE-2021-47595",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47595"
},
{
"cve": "CVE-2021-47596",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47596"
},
{
"cve": "CVE-2021-47597",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47597"
},
{
"cve": "CVE-2021-47598",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47598"
},
{
"cve": "CVE-2021-47599",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47599"
},
{
"cve": "CVE-2021-47600",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47600"
},
{
"cve": "CVE-2021-47601",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47601"
},
{
"cve": "CVE-2021-47602",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47602"
},
{
"cve": "CVE-2021-47603",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47603"
},
{
"cve": "CVE-2021-47604",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47604"
},
{
"cve": "CVE-2021-47605",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47605"
},
{
"cve": "CVE-2021-47606",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47606"
},
{
"cve": "CVE-2021-47607",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47607"
},
{
"cve": "CVE-2021-47608",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47608"
},
{
"cve": "CVE-2021-47609",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47609"
},
{
"cve": "CVE-2021-47610",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47610"
},
{
"cve": "CVE-2021-47611",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47611"
},
{
"cve": "CVE-2021-47612",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47612"
},
{
"cve": "CVE-2021-47613",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47613"
},
{
"cve": "CVE-2021-47614",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47614"
},
{
"cve": "CVE-2021-47615",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47615"
},
{
"cve": "CVE-2021-47616",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47616"
},
{
"cve": "CVE-2021-47617",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47617"
},
{
"cve": "CVE-2021-47618",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47618"
},
{
"cve": "CVE-2021-47619",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47619"
},
{
"cve": "CVE-2021-47620",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2021-47620"
},
{
"cve": "CVE-2024-36979",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-36979"
},
{
"cve": "CVE-2024-38538",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38538"
},
{
"cve": "CVE-2024-38539",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38539"
},
{
"cve": "CVE-2024-38540",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38540"
},
{
"cve": "CVE-2024-38541",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38541"
},
{
"cve": "CVE-2024-38542",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38542"
},
{
"cve": "CVE-2024-38543",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38543"
},
{
"cve": "CVE-2024-38544",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38544"
},
{
"cve": "CVE-2024-38545",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38545"
},
{
"cve": "CVE-2024-38546",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38546"
},
{
"cve": "CVE-2024-38547",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38547"
},
{
"cve": "CVE-2024-38548",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38548"
},
{
"cve": "CVE-2024-38549",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38549"
},
{
"cve": "CVE-2024-38550",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38550"
},
{
"cve": "CVE-2024-38551",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38551"
},
{
"cve": "CVE-2024-38552",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38552"
},
{
"cve": "CVE-2024-38553",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38553"
},
{
"cve": "CVE-2024-38554",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38554"
},
{
"cve": "CVE-2024-38555",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38555"
},
{
"cve": "CVE-2024-38556",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38556"
},
{
"cve": "CVE-2024-38557",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38557"
},
{
"cve": "CVE-2024-38558",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38558"
},
{
"cve": "CVE-2024-38559",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38559"
},
{
"cve": "CVE-2024-38560",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38560"
},
{
"cve": "CVE-2024-38561",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38561"
},
{
"cve": "CVE-2024-38562",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38562"
},
{
"cve": "CVE-2024-38563",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38563"
},
{
"cve": "CVE-2024-38564",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38564"
},
{
"cve": "CVE-2024-38565",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38565"
},
{
"cve": "CVE-2024-38566",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38566"
},
{
"cve": "CVE-2024-38567",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38567"
},
{
"cve": "CVE-2024-38568",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38568"
},
{
"cve": "CVE-2024-38569",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38569"
},
{
"cve": "CVE-2024-38570",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38570"
},
{
"cve": "CVE-2024-38571",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38571"
},
{
"cve": "CVE-2024-38572",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38572"
},
{
"cve": "CVE-2024-38573",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38573"
},
{
"cve": "CVE-2024-38574",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38574"
},
{
"cve": "CVE-2024-38575",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38575"
},
{
"cve": "CVE-2024-38576",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38576"
},
{
"cve": "CVE-2024-38577",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38577"
},
{
"cve": "CVE-2024-38578",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38578"
},
{
"cve": "CVE-2024-38579",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38579"
},
{
"cve": "CVE-2024-38580",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38580"
},
{
"cve": "CVE-2024-38581",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38581"
},
{
"cve": "CVE-2024-38582",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38582"
},
{
"cve": "CVE-2024-38583",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38583"
},
{
"cve": "CVE-2024-38584",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38584"
},
{
"cve": "CVE-2024-38585",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38585"
},
{
"cve": "CVE-2024-38586",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38586"
},
{
"cve": "CVE-2024-38587",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38587"
},
{
"cve": "CVE-2024-38588",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38588"
},
{
"cve": "CVE-2024-38589",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38589"
},
{
"cve": "CVE-2024-38590",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38590"
},
{
"cve": "CVE-2024-38591",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38591"
},
{
"cve": "CVE-2024-38592",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38592"
},
{
"cve": "CVE-2024-38593",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38593"
},
{
"cve": "CVE-2024-38594",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38594"
},
{
"cve": "CVE-2024-38595",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38595"
},
{
"cve": "CVE-2024-38596",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38596"
},
{
"cve": "CVE-2024-38597",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38597"
},
{
"cve": "CVE-2024-38598",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38598"
},
{
"cve": "CVE-2024-38599",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38599"
},
{
"cve": "CVE-2024-38600",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38600"
},
{
"cve": "CVE-2024-38601",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38601"
},
{
"cve": "CVE-2024-38602",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38602"
},
{
"cve": "CVE-2024-38603",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38603"
},
{
"cve": "CVE-2024-38604",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38604"
},
{
"cve": "CVE-2024-38605",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38605"
},
{
"cve": "CVE-2024-38606",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38606"
},
{
"cve": "CVE-2024-38607",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38607"
},
{
"cve": "CVE-2024-38608",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38608"
},
{
"cve": "CVE-2024-38609",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38609"
},
{
"cve": "CVE-2024-38610",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38610"
},
{
"cve": "CVE-2024-38611",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38611"
},
{
"cve": "CVE-2024-38612",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38612"
},
{
"cve": "CVE-2024-38613",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38613"
},
{
"cve": "CVE-2024-38614",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38614"
},
{
"cve": "CVE-2024-38615",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38615"
},
{
"cve": "CVE-2024-38616",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38616"
},
{
"cve": "CVE-2024-38617",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38617"
},
{
"cve": "CVE-2024-38618",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38618"
},
{
"cve": "CVE-2024-38619",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38619"
},
{
"cve": "CVE-2024-38620",
"product_status": {
"known_affected": [
"T040749",
"67646",
"T034583",
"T004914",
"T038741",
"T039852",
"T039851",
"T040074",
"T042774",
"T031092",
"T047343",
"398363",
"T045881",
"T047344",
"T035582",
"T032255",
"T039664",
"T044986",
"2951",
"T002207",
"T034392",
"T045879",
"T000126",
"T002366",
"T030927",
"T048226"
]
},
"release_date": "2024-06-19T22:00:00.000+00:00",
"title": "CVE-2024-38620"
}
]
}
BDU:2025-07524
Vulnerability from fstec - Published: 05.05.2024{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:C/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u043e\u0442 6.9 \u0434\u043e 6.9.2 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 6.8.2 \u0434\u043e 6.8.11 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c\u0441\u044f \"\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c LINUX\", \u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043c\u0435\u0442\u043e\u0434\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435 \u0424\u0421\u0422\u042d\u041a \u0420\u043e\u0441\u0441\u0438\u0438, \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0451\u043d\u043d\u043e\u043c 25 \u0434\u0435\u043a\u0430\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Linux:\nhttps://git.kernel.org/stable/c/f12afddfb142587d786df9e3cc4862190d3e2ec8\nhttps://git.kernel.org/stable/c/168f6fbde0eabd71d1f4133df7d001a950b96977\nhttps://git.kernel.org/stable/c/f79edef79b6a2161f4124112f9b0c46891bb0b74\nhttps://lore.kernel.org/linux-cve-announce/2024061948-CVE-2024-38542-2481@gregkh/\nhttps://git.kernel.org/linus/f79edef79b6a2161f4124112f9b0c46891bb0b74\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.8.12\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9.3\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.8.12\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9.3",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "05.05.2024",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "25.06.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "25.06.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-07524",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-38542",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.9 \u0434\u043e 6.9.2 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 6.8.2 \u0434\u043e 6.8.11 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 mana_ib_install_cq_cb() \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 drivers/infiniband/hw/mana/cq.c \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b linux, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0427\u0442\u0435\u043d\u0438\u0435 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 (CWE-125)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 mana_ib_install_cq_cb() \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 drivers/infiniband/hw/mana/cq.c \u044f\u0434\u0440\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b linux \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0432\u044b\u0445\u043e\u0434\u043e\u043c \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://ubuntu.com/security/notices/USN-6955-1\nhttps://ubuntu.com/security/notices/USN-6949-2\nhttps://ubuntu.com/security/notices/USN-6952-2\nhttps://www.cve.org/CVERecord?id=CVE-2024-38542\nhttps://git.kernel.org/stable/c/f12afddfb142587d786df9e3cc4862190d3e2ec8\nhttps://git.kernel.org/stable/c/168f6fbde0eabd71d1f4133df7d001a950b96977\nhttps://git.kernel.org/stable/c/f79edef79b6a2161f4124112f9b0c46891bb0b74\nhttps://lore.kernel.org/linux-cve-announce/2024061948-CVE-2024-38542-2481@gregkh/\nhttps://git.kernel.org/linus/f79edef79b6a2161f4124112f9b0c46891bb0b74\nhttps://ubuntu.com/security/notices/USN-6949-1\nhttps://ubuntu.com/security/notices/USN-6952-1\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.8.12\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9.3\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.8.12\nhttps://kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9.3",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-125",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,2)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,1)"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.