Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-23239 (GCVE-0-2026-23239)
Vulnerability from cvelistv5 – Published: 2026-03-10 17:28 – Updated: 2026-04-13 06:02| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
e27cca96cd68fa2c6814c90f9a1cfd36bb68c593 , < f7ad8b1d0e421c524604d5076b73232093490d5c
(git)
Affected: e27cca96cd68fa2c6814c90f9a1cfd36bb68c593 , < 664e9df53226b4505a0894817ecad2c610ab11d8 (git) Affected: e27cca96cd68fa2c6814c90f9a1cfd36bb68c593 , < 022ff7f347588de6e17879a1da6019647b21321b (git) Affected: e27cca96cd68fa2c6814c90f9a1cfd36bb68c593 , < e1512c1db9e8794d8d130addd2615ec27231d994 (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"net/xfrm/espintcp.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "f7ad8b1d0e421c524604d5076b73232093490d5c",
"status": "affected",
"version": "e27cca96cd68fa2c6814c90f9a1cfd36bb68c593",
"versionType": "git"
},
{
"lessThan": "664e9df53226b4505a0894817ecad2c610ab11d8",
"status": "affected",
"version": "e27cca96cd68fa2c6814c90f9a1cfd36bb68c593",
"versionType": "git"
},
{
"lessThan": "022ff7f347588de6e17879a1da6019647b21321b",
"status": "affected",
"version": "e27cca96cd68fa2c6814c90f9a1cfd36bb68c593",
"versionType": "git"
},
{
"lessThan": "e1512c1db9e8794d8d130addd2615ec27231d994",
"status": "affected",
"version": "e27cca96cd68fa2c6814c90f9a1cfd36bb68c593",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"net/xfrm/espintcp.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.6"
},
{
"lessThan": "5.6",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.75",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.16",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.19.*",
"status": "unaffected",
"version": "6.19.6",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "7.0",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.75",
"versionStartIncluding": "5.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.16",
"versionStartIncluding": "5.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19.6",
"versionStartIncluding": "5.6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0",
"versionStartIncluding": "5.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nespintcp: Fix race condition in espintcp_close()\n\nThis issue was discovered during a code audit.\n\nAfter cancel_work_sync() is called from espintcp_close(),\nespintcp_tx_work() can still be scheduled from paths such as\nthe Delayed ACK handler or ksoftirqd.\nAs a result, the espintcp_tx_work() worker may dereference a\nfreed espintcp ctx or sk.\n\nThe following is a simple race scenario:\n\n cpu0 cpu1\n\n espintcp_close()\n cancel_work_sync(\u0026ctx-\u003ework);\n espintcp_write_space()\n schedule_work(\u0026ctx-\u003ework);\n\nTo prevent this race condition, cancel_work_sync() is\nreplaced with disable_work_sync()."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-13T06:02:54.954Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/f7ad8b1d0e421c524604d5076b73232093490d5c"
},
{
"url": "https://git.kernel.org/stable/c/664e9df53226b4505a0894817ecad2c610ab11d8"
},
{
"url": "https://git.kernel.org/stable/c/022ff7f347588de6e17879a1da6019647b21321b"
},
{
"url": "https://git.kernel.org/stable/c/e1512c1db9e8794d8d130addd2615ec27231d994"
}
],
"title": "espintcp: Fix race condition in espintcp_close()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-23239",
"datePublished": "2026-03-10T17:28:26.190Z",
"dateReserved": "2026-01-13T15:37:45.989Z",
"dateUpdated": "2026-04-13T06:02:54.954Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-23239",
"date": "2026-04-22",
"epss": "0.00015",
"percentile": "0.03401"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-23239\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-03-10T18:18:13.383\",\"lastModified\":\"2026-04-02T15:16:25.183\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nespintcp: Fix race condition in espintcp_close()\\n\\nThis issue was discovered during a code audit.\\n\\nAfter cancel_work_sync() is called from espintcp_close(),\\nespintcp_tx_work() can still be scheduled from paths such as\\nthe Delayed ACK handler or ksoftirqd.\\nAs a result, the espintcp_tx_work() worker may dereference a\\nfreed espintcp ctx or sk.\\n\\nThe following is a simple race scenario:\\n\\n cpu0 cpu1\\n\\n espintcp_close()\\n cancel_work_sync(\u0026ctx-\u003ework);\\n espintcp_write_space()\\n schedule_work(\u0026ctx-\u003ework);\\n\\nTo prevent this race condition, cancel_work_sync() is\\nreplaced with disable_work_sync().\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\\n\\nespintcp: Correcci\u00f3n de condici\u00f3n de carrera en espintcp_close()\\n\\nEste problema fue descubierto durante una auditor\u00eda de c\u00f3digo.\\n\\nDespu\u00e9s de que se llama a cancel_work_sync() desde espintcp_close(), espintcp_tx_work() a\u00fan puede ser programado desde rutas como el gestor de ACK Retrasado o ksoftirqd.\\nComo resultado, el trabajador espintcp_tx_work() puede desreferenciar un ctx o sk de espintcp liberado.\\n\\nEl siguiente es un escenario de condici\u00f3n de carrera simple:\\n\\n cpu0 cpu1\\n\\n espintcp_close()\\n cancel_work_sync(\u0026amp;ctx-\u0026gt;work);\\n espintcp_write_space()\\n schedule_work(\u0026amp;ctx-\u0026gt;work);\\n\\nPara prevenir esta condici\u00f3n de carrera, cancel_work_sync() es reemplazado por disable_work_sync().\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/022ff7f347588de6e17879a1da6019647b21321b\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/664e9df53226b4505a0894817ecad2c610ab11d8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/e1512c1db9e8794d8d130addd2615ec27231d994\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f7ad8b1d0e421c524604d5076b73232093490d5c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
CERTFR-2026-AVI-0316
Vulnerability from certfr_avis - Published: 2026-03-19 - Updated: 2026-03-19
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | NodeJS Buildpack versions antérieures à 1.8.82 | ||
| VMware | Tanzu Platform | Tanzu for MySQL sur Tanzu Platform versions antérieures à 10.1.1 | ||
| VMware | N/A | Java Buildpack versions antérieures à 4.90.0 | ||
| VMware | N/A | NGINX Buildpack versions antérieures à 1.2.71 | ||
| VMware | N/A | HWC Buildpack versions antérieures à 3.1.91 | ||
| VMware | Tanzu Platform | Foundation Core for VMware Tanzu Platform versions antérieures à 3.1.9 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.82",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.90.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NGINX Buildpack versions ant\u00e9rieures \u00e0 1.2.71",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "HWC Buildpack versions ant\u00e9rieures \u00e0 3.1.91",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core for VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-28422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28422"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-35875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35875"
},
{
"name": "CVE-2022-50759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50759"
},
{
"name": "CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-36026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36026"
},
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2023-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3640"
},
{
"name": "CVE-2024-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27435"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2024-42122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2026-28420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28420"
},
{
"name": "CVE-2022-49069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49069"
},
{
"name": "CVE-2024-57875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57875"
},
{
"name": "CVE-2022-27943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-54129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54129"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-49543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49543"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2023-53562",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53562"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2024-50063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50063"
},
{
"name": "CVE-2023-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33875"
},
{
"name": "CVE-2024-41001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41001"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-36353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36353"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2023-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53247"
},
{
"name": "CVE-2025-38042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38042"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2023-53829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53829"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2023-54002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54002"
},
{
"name": "CVE-2022-50550",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50550"
},
{
"name": "CVE-2022-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0400"
},
{
"name": "CVE-2022-49138",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49138"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2022-49359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49359"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2022-48673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48673"
},
{
"name": "CVE-2022-50425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50425"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2024-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39293"
},
{
"name": "CVE-2023-53008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53008"
},
{
"name": "CVE-2025-38669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38669"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2024-38306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38306"
},
{
"name": "CVE-2023-53733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53733"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2023-1386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1386"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-56703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
},
{
"name": "CVE-2026-23098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23098"
},
{
"name": "CVE-2023-53347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53347"
},
{
"name": "CVE-2023-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28374"
},
{
"name": "CVE-2023-52926",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52926"
},
{
"name": "CVE-2026-32597",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32597"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2026-25500",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25500"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27558"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0076"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2024-58237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58237"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2023-53529",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53529"
},
{
"name": "CVE-2024-50028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50028"
},
{
"name": "CVE-2023-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53042"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-58094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2025-52534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52534"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2024-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46705"
},
{
"name": "CVE-2022-50407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50407"
},
{
"name": "CVE-2026-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23196"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"name": "CVE-2024-45775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45775"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2022-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49901"
},
{
"name": "CVE-2026-23126",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23126"
},
{
"name": "CVE-2025-38329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38329"
},
{
"name": "CVE-2021-33096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33096"
},
{
"name": "CVE-2022-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50230"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2023-53588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53588"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-37870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2022-49533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49533"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2020-26557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26557"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2021-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33114"
},
{
"name": "CVE-2025-69645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69645"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2022-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49125"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2024-26866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26866"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2023-52561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52561"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2024-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53221"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2023-53362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53362"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2024-26756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26756"
},
{
"name": "CVE-2022-50815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50815"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-38036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38036"
},
{
"name": "CVE-2025-2668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2668"
},
{
"name": "CVE-2025-71221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71221"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2024-46860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46860"
},
{
"name": "CVE-2025-22040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22040"
},
{
"name": "CVE-2024-53095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53095"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2024-56665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56665"
},
{
"name": "CVE-2025-38340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38340"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-53629",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53629"
},
{
"name": "CVE-2022-50178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50178"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2025-37880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37880"
},
{
"name": "CVE-2025-36427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36427"
},
{
"name": "CVE-2026-23217",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23217"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-37833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53320"
},
{
"name": "CVE-2024-44961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44961"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2025-21656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21656"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2025-69650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69650"
},
{
"name": "CVE-2022-50554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50554"
},
{
"name": "CVE-2023-53509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53509"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2024-46775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46775"
},
{
"name": "CVE-2025-39764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39764"
},
{
"name": "CVE-2025-38207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38207"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2024-26807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26807"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-49742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49742"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2024-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52560"
},
{
"name": "CVE-2024-56604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56604"
},
{
"name": "CVE-2026-23227",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23227"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2023-52508",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52508"
},
{
"name": "CVE-2025-69647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69647"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2024-50014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50014"
},
{
"name": "CVE-2022-49108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49108"
},
{
"name": "CVE-2024-56677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56677"
},
{
"name": "CVE-2025-38717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38717"
},
{
"name": "CVE-2026-3497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3497"
},
{
"name": "CVE-2025-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22019"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2024-26767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2026-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2219"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2024-35926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35926"
},
{
"name": "CVE-2024-27389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27389"
},
{
"name": "CVE-2024-26983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26983"
},
{
"name": "CVE-2022-50627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50627"
},
{
"name": "CVE-2024-50285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50285"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38029"
},
{
"name": "CVE-2022-49123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49123"
},
{
"name": "CVE-2024-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50289"
},
{
"name": "CVE-2023-53258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53258"
},
{
"name": "CVE-2024-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46813"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47658"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2025-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38096"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2023-53429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53429"
},
{
"name": "CVE-2024-46765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46765"
},
{
"name": "CVE-2022-50380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50380"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2022-48990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48990"
},
{
"name": "CVE-2024-24864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24864"
},
{
"name": "CVE-2024-35832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35832"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2026-23220",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23220"
},
{
"name": "CVE-2024-45782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45782"
},
{
"name": "CVE-2022-50785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50785"
},
{
"name": "CVE-2025-39745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39745"
},
{
"name": "CVE-2024-35799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35799"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-71223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71223"
},
{
"name": "CVE-2025-36098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36098"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2023-53325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53325"
},
{
"name": "CVE-2025-21752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21752"
},
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-39282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39282"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2024-40975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40975"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2023-46316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46316"
},
{
"name": "CVE-2024-47866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47866"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-39925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39925"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-68794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68794"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2022-48667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48667"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2024-56744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56744"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2022-49161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49161"
},
{
"name": "CVE-2021-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21240"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2023-52485",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52485"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2022-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49997"
},
{
"name": "CVE-2022-49469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49469"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2022-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0480"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2024-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49932"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-1272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1272"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2022-49651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49651"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2024-26770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26770"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2024-27041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27041"
},
{
"name": "CVE-2025-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36184"
},
{
"name": "CVE-2026-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3195"
},
{
"name": "CVE-2025-37743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
},
{
"name": "CVE-2025-40005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40005"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-26242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26242"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-52673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52673"
},
{
"name": "CVE-2024-56722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56722"
},
{
"name": "CVE-2021-33113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33113"
},
{
"name": "CVE-2022-48668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48668"
},
{
"name": "CVE-2024-27418",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27418"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-68806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68806"
},
{
"name": "CVE-2022-50322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50322"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2022-27635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27635"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2024-49922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49922"
},
{
"name": "CVE-2020-12317",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12317"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2024-49909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49909"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2021-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4095"
},
{
"name": "CVE-2022-50240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50240"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2024-45015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45015"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71074"
},
{
"name": "CVE-2025-38673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38673"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-11234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11234"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2023-53447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53447"
},
{
"name": "CVE-2024-46754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46754"
},
{
"name": "CVE-2021-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0161"
},
{
"name": "CVE-2018-1121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1121"
},
{
"name": "CVE-2022-49547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49547"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2025-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0622"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-26757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26757"
},
{
"name": "CVE-2024-49899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49899"
},
{
"name": "CVE-2022-49484",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49484"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2023-53248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53248"
},
{
"name": "CVE-2024-56788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56788"
},
{
"name": "CVE-2016-8660",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8660"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-7519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7519"
},
{
"name": "CVE-2023-53491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53491"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49908"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2026-28421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28421"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2026-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27171"
},
{
"name": "CVE-2022-50811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50811"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2023-53366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53366"
},
{
"name": "CVE-2022-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2022-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49203"
},
{
"name": "CVE-2024-40918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40918"
},
{
"name": "CVE-2024-27032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27032"
},
{
"name": "CVE-2022-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50236"
},
{
"name": "CVE-2024-35932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35932"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2026-23137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23137"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-37882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37882"
},
{
"name": "CVE-2024-35971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35971"
},
{
"name": "CVE-2024-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46762"
},
{
"name": "CVE-2023-34983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34983"
},
{
"name": "CVE-2024-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35868"
},
{
"name": "CVE-2023-53323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53323"
},
{
"name": "CVE-2026-3731",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3731"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2023-52857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2022-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50304"
},
{
"name": "CVE-2026-23226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23226"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2024-43844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43844"
},
{
"name": "CVE-2023-52920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52920"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2021-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0072"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-69652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69652"
},
{
"name": "CVE-2025-21635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38353"
},
{
"name": "CVE-2025-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36009"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2023-52761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52761"
},
{
"name": "CVE-2022-49773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49773"
},
{
"name": "CVE-2023-53609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53609"
},
{
"name": "CVE-2023-53478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53478"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2023-53682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53682"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2026-3442",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3442"
},
{
"name": "CVE-2024-58238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58238"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-22039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22039"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39933"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-47908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47908"
},
{
"name": "CVE-2022-49722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49722"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2024-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35945"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2020-35501",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35501"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2023-52624",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52624"
},
{
"name": "CVE-2024-56557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56557"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2023-52632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52632"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-36070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36070"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2023-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53198"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2022-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50234"
},
{
"name": "CVE-2025-38082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38082"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-49934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49934"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2026-23066",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23066"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2023-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4969"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-53789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53789"
},
{
"name": "CVE-2022-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-36428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36428"
},
{
"name": "CVE-2023-53520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53520"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2024-35803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35803"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2024-8612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8612"
},
{
"name": "CVE-2023-52586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52586"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2021-33110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33110"
},
{
"name": "CVE-2025-37834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37834"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2019-19378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19378"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2025-38426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38426"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2026-23236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23236"
},
{
"name": "CVE-2023-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
},
{
"name": "CVE-2025-22090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
},
{
"name": "CVE-2021-31615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31615"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49932"
},
{
"name": "CVE-2022-25837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25837"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2024-49939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49939"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2023-52831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52831"
},
{
"name": "CVE-2023-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53221"
},
{
"name": "CVE-2024-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26719"
},
{
"name": "CVE-2022-44034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44034"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53072"
},
{
"name": "CVE-2023-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2007"
},
{
"name": "CVE-2022-37341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37341"
},
{
"name": "CVE-2025-69648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69648"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2024-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50298"
},
{
"name": "CVE-2025-36424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36424"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2024-46843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46843"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-36387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36387"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2023-53602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53602"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2023-53867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53867"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-37926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37926"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2025-38038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38038"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2023-33053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33053"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2026-24051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24051"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2025-38261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38261"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-69644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69644"
},
{
"name": "CVE-2022-49303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49303"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2025-11961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11961"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2022-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3114"
},
{
"name": "CVE-2023-52916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52916"
},
{
"name": "CVE-2025-38064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38064"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2022-50628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50628"
},
{
"name": "CVE-2024-56718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2022-50350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50350"
},
{
"name": "CVE-2025-21831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21831"
},
{
"name": "CVE-2022-50721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50721"
},
{
"name": "CVE-2022-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50095"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2026-3196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3196"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2024-50217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50217"
},
{
"name": "CVE-2021-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0168"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2022-50479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50479"
},
{
"name": "CVE-2022-50583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50583"
},
{
"name": "CVE-2025-37806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37806"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2023-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0030"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2024-53179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53179"
},
{
"name": "CVE-2024-57945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57945"
},
{
"name": "CVE-2023-54233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54233"
},
{
"name": "CVE-2024-43899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43899"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2019-15213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2022-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49935"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2022-49534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49534"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-53010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53010"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-57888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57888"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2023-54237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54237"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49134"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2022-49333",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49333"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2024-49994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2019-19814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19814"
},
{
"name": "CVE-2022-49136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49136"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-44962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44962"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2024-35931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35931"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2026-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23138"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2023-26551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26551"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53210"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2022-49342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49342"
},
{
"name": "CVE-2015-8553",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8553"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2023-53332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53332"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-58095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2022-49471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49471"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2025-21751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21751"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2026-23234",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23234"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2024-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
},
{
"name": "CVE-2025-23162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23162"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2017-13694",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13694"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2026-23212",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23212"
},
{
"name": "CVE-2013-7445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7445"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2023-52701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52701"
},
{
"name": "CVE-2024-49906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49906"
},
{
"name": "CVE-2024-26647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26647"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2024-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47809"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2022-49317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49317"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2018-12928",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12928"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-56607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56607"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2024-49904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49904"
},
{
"name": "CVE-2023-53671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53671"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2024-26938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26938"
},
{
"name": "CVE-2026-28417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28417"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2023-29942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29942"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2022-48633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48633"
},
{
"name": "CVE-2022-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3238"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2026-22185",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22185"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2023-53584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53584"
},
{
"name": "CVE-2024-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57809"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2024-56719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
},
{
"name": "CVE-2022-50418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50418"
},
{
"name": "CVE-2023-53438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53438"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2023-53460",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53460"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2024-56671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56671"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2022-49562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49562"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2023-53483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53483"
},
{
"name": "CVE-2023-53673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53673"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-37746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37746"
},
{
"name": "CVE-2022-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38076"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2024-56368",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-49172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49172"
},
{
"name": "CVE-2024-40979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40979"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2026-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23240"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2026-23228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23228"
},
{
"name": "CVE-2024-49945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49945"
},
{
"name": "CVE-2022-44033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44033"
},
{
"name": "CVE-2024-56757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56757"
},
{
"name": "CVE-2023-53662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53662"
},
{
"name": "CVE-2025-38069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38069"
},
{
"name": "CVE-2022-49750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49750"
},
{
"name": "CVE-2023-53707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53707"
},
{
"name": "CVE-2023-53115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53115"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2022-48646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48646"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-35808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35808"
},
{
"name": "CVE-2024-58012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58012"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-68772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68772"
},
{
"name": "CVE-2024-49891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49891"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2022-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48887"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-26948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26948"
},
{
"name": "CVE-2023-53370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53370"
},
{
"name": "CVE-2024-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53187"
},
{
"name": "CVE-2023-45929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45929"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2024-57795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57795"
},
{
"name": "CVE-2025-37855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37855"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2021-33115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33115"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2020-26559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26559"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-32249",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32249"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2024-43831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
},
{
"name": "CVE-2023-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-38330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38330"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2017-13693",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13693"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2022-49306",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49306"
},
{
"name": "CVE-2024-49898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49898"
},
{
"name": "CVE-2025-36423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36423"
},
{
"name": "CVE-2022-49622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49622"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-50211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50211"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2022-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50284"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
},
{
"name": "CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"name": "CVE-2024-27035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27035"
},
{
"name": "CVE-2023-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53218"
},
{
"name": "CVE-2022-25836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25836"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-29934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29934"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2022-49133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-38438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38438"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2023-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26555"
},
{
"name": "CVE-2023-1193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1193"
},
{
"name": "CVE-2025-71220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71220"
},
{
"name": "CVE-2024-46806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46806"
},
{
"name": "CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2026-23103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23103"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-68786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68786"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2022-50393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50393"
},
{
"name": "CVE-2025-68779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68779"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-21819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
},
{
"name": "CVE-2025-48514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48514"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2024-47664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47664"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2026-25749",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25749"
},
{
"name": "CVE-2024-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49504"
},
{
"name": "CVE-2025-38118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53367"
},
{
"name": "CVE-2022-50500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50500"
},
{
"name": "CVE-2019-14899",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14899"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2024-53098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53098"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2026-23180",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23180"
},
{
"name": "CVE-2021-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0164"
},
{
"name": "CVE-2024-46870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46870"
},
{
"name": "CVE-2022-49178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49178"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-49929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49929"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2022-49173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49173"
},
{
"name": "CVE-2024-45781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45781"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2024-53056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53056"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2026-26269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26269"
},
{
"name": "CVE-2024-43872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43872"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2023-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52939"
},
{
"name": "CVE-2024-14027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-14027"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-69649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69649"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2022-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49766"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-22043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22043"
},
{
"name": "CVE-2024-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49569"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2024-56609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56609"
},
{
"name": "CVE-2022-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49940"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2024-56611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56611"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2020-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25743"
},
{
"name": "CVE-2022-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50167"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2026-27704",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27704"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2023-45896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45896"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2024-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2021-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3735"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2024-46861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46861"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2022-50634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50634"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-54514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54514"
},
{
"name": "CVE-2025-71202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71202"
},
{
"name": "CVE-2015-7837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7837"
},
{
"name": "CVE-2025-0677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0677"
},
{
"name": "CVE-2024-45780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45780"
},
{
"name": "CVE-2024-46749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46749"
},
{
"name": "CVE-2022-50492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50492"
},
{
"name": "CVE-2024-49888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49888"
},
{
"name": "CVE-2022-50406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50406"
},
{
"name": "CVE-2023-26552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26552"
},
{
"name": "CVE-2024-49921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49921"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-59691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59691"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2023-52481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52481"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2025-22057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2024-50056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2026-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1788"
},
{
"name": "CVE-2023-53721",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53721"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2022-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50256"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-37907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37907"
},
{
"name": "CVE-2024-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38625"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2023-4010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4010"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2024-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46727"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2023-54105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54105"
},
{
"name": "CVE-2018-17977",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17977"
},
{
"name": "CVE-2019-1010204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010204"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2022-50354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50354"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2026-23216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
},
{
"name": "CVE-2023-53434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53434"
},
{
"name": "CVE-2023-29935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29935"
},
{
"name": "CVE-2023-35061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2026-21636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21636"
},
{
"name": "CVE-2026-23239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23239"
},
{
"name": "CVE-2021-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0172"
},
{
"name": "CVE-2024-47662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47662"
},
{
"name": "CVE-2018-12930",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12930"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2024-49970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49970"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2023-32644",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32644"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2024-46681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46681"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-40012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40012"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2024-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47141"
},
{
"name": "CVE-2024-8354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8354"
},
{
"name": "CVE-2023-54323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54323"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2025-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0689"
},
{
"name": "CVE-2022-50316",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50316"
},
{
"name": "CVE-2023-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31347"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2023-53657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53657"
},
{
"name": "CVE-2024-49915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49915"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2023-52732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52732"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2022-49167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49167"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2026-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27903"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2025-0690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0690"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2023-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2022-49234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49234"
},
{
"name": "CVE-2022-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50163"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2024-49919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49919"
},
{
"name": "CVE-2026-23238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23238"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2020-26556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26556"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2024-26699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26699"
},
{
"name": "CVE-2024-57876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57876"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2022-50390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50390"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-71186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71186"
},
{
"name": "CVE-2024-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53220"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2023-53539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53539"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-31648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31648"
},
{
"name": "CVE-2026-1229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1229"
},
{
"name": "CVE-2025-0678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0678"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2024-56674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56674"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2019-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1563"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2022-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50166"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2024-56738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56738"
},
{
"name": "CVE-2022-50778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50778"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2022-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49971"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-21693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
},
{
"name": "CVE-2025-71203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71203"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2025-39789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39789"
},
{
"name": "CVE-2022-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2024-56583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56583"
},
{
"name": "CVE-2022-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50195"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-56712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56712"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-52634",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52634"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2025-62526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62526"
},
{
"name": "CVE-2024-49918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49918"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-45776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45776"
},
{
"name": "CVE-2022-50090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50090"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2020-14356",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14356"
},
{
"name": "CVE-2025-68745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68745"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-53764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53764"
},
{
"name": "CVE-2024-53687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53687"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2024-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38628"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-38672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38672"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-0684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0684"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2024-47794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2025-38272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38272"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2019-20794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20794"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2022-4543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4543"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2023-53627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53627"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38091"
},
{
"name": "CVE-2023-53510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53510"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2023-53575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53575"
},
{
"name": "CVE-2022-49516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49516"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2022-3523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3523"
},
{
"name": "CVE-2026-26157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26157"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2025-22072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22072"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2026-23193",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23193"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-47736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47736"
},
{
"name": "CVE-2023-53037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53037"
},
{
"name": "CVE-2024-46842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46842"
},
{
"name": "CVE-2025-71237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71237"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2024-50112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50112"
},
{
"name": "CVE-2025-69646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69646"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2026-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23215"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2020-26142",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26142"
},
{
"name": "CVE-2022-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49955"
},
{
"name": "CVE-2023-53628",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53628"
},
{
"name": "CVE-2025-29943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29943"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-38140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38140"
},
{
"name": "CVE-2022-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50002"
},
{
"name": "CVE-2025-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38621"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39908"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2024-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49920"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2026-23118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23118"
},
{
"name": "CVE-2025-34034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34034"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-59692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59692"
},
{
"name": "CVE-2022-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50116"
},
{
"name": "CVE-2018-12931",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12931"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2022-50224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50224"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-13791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13791"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2024-49990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49990"
},
{
"name": "CVE-2020-15802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15802"
},
{
"name": "CVE-2020-24240",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24240"
},
{
"name": "CVE-2024-46718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46718"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2023-53545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53545"
},
{
"name": "CVE-2022-50552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50552"
},
{
"name": "CVE-2021-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0066"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2023-53376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53376"
},
{
"name": "CVE-2023-53538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53538"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2022-50357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50357"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2023-52671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52671"
},
{
"name": "CVE-2022-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50303"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2023-52676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52676"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2017-13165",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13165"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-46811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46811"
},
{
"name": "CVE-2025-21985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
},
{
"name": "CVE-2025-22109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2023-53635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53635"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-23132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23132"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2022-49531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49531"
},
{
"name": "CVE-2022-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49504"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2022-49810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-71109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71109"
},
{
"name": "CVE-2023-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26586"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-44950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44950"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2022-50332",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50332"
},
{
"name": "CVE-2023-53822",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53822"
},
{
"name": "CVE-2024-27408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27408"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2022-50461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50461"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2023-26554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26554"
},
{
"name": "CVE-2025-38486",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38486"
},
{
"name": "CVE-2021-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26934"
},
{
"name": "CVE-2023-53466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53466"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53168"
},
{
"name": "CVE-2022-49528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49528"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-49218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49218"
},
{
"name": "CVE-2023-52749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52749"
},
{
"name": "CVE-2025-39754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39754"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2022-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49967"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2022-49245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49245"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2023-52682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52682"
},
{
"name": "CVE-2022-50871",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50871"
},
{
"name": "CVE-2025-71150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71150"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2025-39958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39958"
},
{
"name": "CVE-2018-8956",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8956"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2022-49420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49420"
},
{
"name": "CVE-2022-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40964"
},
{
"name": "CVE-2026-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3441"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2023-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53149"
},
{
"name": "CVE-2026-23237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23237"
},
{
"name": "CVE-2024-49987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49987"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2022-50746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50746"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2024-50034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50034"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2023-53596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53596"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2022-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50260"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2020-12319",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12319"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2023-3397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3397"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2024-26672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26672"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2021-33139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33139"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2024-50057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50057"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2024-46808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46808"
},
{
"name": "CVE-2026-26158",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26158"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-38168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38168"
},
{
"name": "CVE-2023-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53547"
},
{
"name": "CVE-2019-20426",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20426"
},
{
"name": "CVE-2025-71107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71107"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2026-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29786"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-56584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56584"
},
{
"name": "CVE-2026-23235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23235"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-71152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71152"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-56692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56692"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2022-50212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50212"
},
{
"name": "CVE-2026-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23087"
},
{
"name": "CVE-2023-54259",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54259"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2025-1369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1369"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2022-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2961"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-49635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
},
{
"name": "CVE-2024-50017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50017"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2024-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-33155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33155"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2024-57899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57899"
},
{
"name": "CVE-2024-49928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49928"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36001"
},
{
"name": "CVE-2022-50464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50464"
},
{
"name": "CVE-2025-38674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38674"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2020-26560",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26560"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-45777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45777"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2022-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49965"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2024-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0564"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2022-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49961"
},
{
"name": "CVE-2025-69651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69651"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2024-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58098"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2022-28667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28667"
},
{
"name": "CVE-2023-53383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53383"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2026-23164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23164"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2025-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0033"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2024-42319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42319"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-13716",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13716"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-36024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36024"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2025-38440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38440"
},
{
"name": "CVE-2026-23124",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23124"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2024-53224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53224"
},
{
"name": "CVE-2024-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49910"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2023-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53105"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2024-39286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39286"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2024-47689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47689"
},
{
"name": "CVE-2025-71160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71160"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2023-52625",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52625"
},
{
"name": "CVE-2023-53353",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53353"
},
{
"name": "CVE-2024-58096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2023-53401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53401"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2023-53702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53702"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2023-54059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54059"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2021-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0170"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-53133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53133"
},
{
"name": "CVE-2026-23075",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23075"
},
{
"name": "CVE-2022-50571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50571"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2026-23120",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23120"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2022-49393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49393"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-71204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71204"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-26758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2023-32651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32651"
},
{
"name": "CVE-2025-37747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2023-53036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53036"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-71115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71115"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2025-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1118"
},
{
"name": "CVE-2024-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50166"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2023-53355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53355"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2026-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23181"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2023-53558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53558"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-22860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22860"
},
{
"name": "CVE-2025-36365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36365"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2025-0686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0686"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2025-68781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68781"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2021-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0173"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2024-45778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45778"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2024-47661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47661"
},
{
"name": "CVE-2026-28418",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28418"
},
{
"name": "CVE-2023-54151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54151"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2024-46803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46803"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2022-36351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36351"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2024-54683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-26658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26658"
},
{
"name": "CVE-2026-2243",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2243"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2021-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0174"
},
{
"name": "CVE-2025-8746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8746"
},
{
"name": "CVE-2025-36442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36442"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2026-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0968"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-45779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45779"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-57857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57857"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-50213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50213"
},
{
"name": "CVE-2024-46823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46823"
},
{
"name": "CVE-2023-32642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32642"
},
{
"name": "CVE-2025-71227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71227"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2022-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50015"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2024-7883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7883"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2022-50772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50772"
},
{
"name": "CVE-2024-56717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56717"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-45885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45885"
},
{
"name": "CVE-2022-49783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2025-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47153"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2024-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53216"
},
{
"name": "CVE-2022-49539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49539"
},
{
"name": "CVE-2024-36347",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36347"
},
{
"name": "CVE-2024-26869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2021-20255",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20255"
},
{
"name": "CVE-2022-48979",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48979"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-71193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71193"
},
{
"name": "CVE-2023-54180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54180"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2023-25951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25951"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2023-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53152"
},
{
"name": "CVE-2021-0308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0308"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2024-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50009"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2023-45927",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45927"
},
{
"name": "CVE-2020-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25742"
},
{
"name": "CVE-2022-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0987"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-38199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38199"
},
{
"name": "CVE-2025-39905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39905"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2022-50720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50720"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2022-49529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49529"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2024-26876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26876"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2023-52657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52657"
},
{
"name": "CVE-2025-37876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37876"
},
{
"name": "CVE-2024-58089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58089"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2026-27571",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27571"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2022-49127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49127"
},
{
"name": "CVE-2020-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25741"
},
{
"name": "CVE-2022-50748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50748"
},
{
"name": "CVE-2023-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53767"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2023-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53180"
},
{
"name": "CVE-2026-28419",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28419"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2023-53385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53385"
},
{
"name": "CVE-2026-23206",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23206"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2024-46678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46678"
},
{
"name": "CVE-2024-58097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
},
{
"name": "CVE-2023-53620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53620"
},
{
"name": "CVE-2022-50539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50539"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2022-49496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49496"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2024-56782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56782"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2023-53540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53540"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-53261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53261"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2023-54187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54187"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2022-44032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44032"
},
{
"name": "CVE-2024-57895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57895"
},
{
"name": "CVE-2023-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53240"
},
{
"name": "CVE-2025-13735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13735"
},
{
"name": "CVE-2023-53694",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53694"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2024-35794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35794"
},
{
"name": "CVE-2023-52829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52829"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-56660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56660"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2025-38033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38033"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-47704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47704"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2025-36366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36366"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2025-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36123"
},
{
"name": "CVE-2024-56737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56737"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2020-11935",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11935"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-22042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22042"
},
{
"name": "CVE-2025-71158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71158"
},
{
"name": "CVE-2022-49803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49803"
},
{
"name": "CVE-2024-57898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57898"
},
{
"name": "CVE-2020-35503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35503"
},
{
"name": "CVE-2024-49923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49923"
},
{
"name": "CVE-2024-56639",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56639"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-53002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53002"
},
{
"name": "CVE-2021-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0183"
},
{
"name": "CVE-2025-39884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39884"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"name": "CVE-2024-35826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35826"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2022-49764",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49764"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-21651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21651"
},
{
"name": "CVE-2025-38092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38092"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2023-26553",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26553"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-37776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37776"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2024-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6519"
},
{
"name": "CVE-2024-46729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46729"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50266"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2023-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2022-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50009"
},
{
"name": "CVE-2022-26047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26047"
},
{
"name": "CVE-2024-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-37877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37877"
},
{
"name": "CVE-2024-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2193"
},
{
"name": "CVE-2025-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4382"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2025-71161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71161"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-22038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22038"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-50518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50518"
},
{
"name": "CVE-2022-49829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49829"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2016-2568",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2568"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2018-12929",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12929"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2024-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53147"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2024-45783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45783"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2023-53410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53410"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2025-68809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68809"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2021-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0165"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2022-49177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49177"
},
{
"name": "CVE-2025-38205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38205"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2024-58241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58241"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2022-49833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49833"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-68817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68817"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2024-53079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53079"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1125"
},
{
"name": "CVE-2023-53647",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53647"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0012"
},
{
"name": "CVE-2020-12313",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12313"
},
{
"name": "CVE-2025-71233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71233"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2021-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0166"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2022-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3872"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2024-49931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49931"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2026-23031",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23031"
},
{
"name": "CVE-2024-46730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46730"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2024-46728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46728"
},
{
"name": "CVE-2023-53561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53561"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2026-23050",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23050"
},
{
"name": "CVE-2024-58100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58100"
},
{
"name": "CVE-2020-0256",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0256"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-26954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26954"
},
{
"name": "CVE-2025-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21634"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2025-38047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38047"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2017-0537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0537"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2023-26112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26112"
},
{
"name": "CVE-2018-6952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6952"
},
{
"name": "CVE-2020-14304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14304"
},
{
"name": "CVE-2024-46834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46834"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2026-24001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24001"
},
{
"name": "CVE-2025-37807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37807"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2022-50016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50016"
},
{
"name": "CVE-2025-29481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29481"
},
{
"name": "CVE-2024-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53219"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2024-25740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25740"
},
{
"name": "CVE-2024-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-57950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57950"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2021-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0176"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2022-48998",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48998"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49974"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2019-20633",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20633"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2021-3714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3714"
},
{
"name": "CVE-2023-54071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54071"
},
{
"name": "CVE-2024-56566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56566"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-47745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47745"
},
{
"name": "CVE-2025-39833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39833"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2024-53190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53190"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2024-35784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35784"
},
{
"name": "CVE-2024-56591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56591"
},
{
"name": "CVE-2024-56544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56544"
},
{
"name": "CVE-2024-56647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56647"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2024-57976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57976"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0685"
},
{
"name": "CVE-2024-57893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57893"
},
{
"name": "CVE-2026-23231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2022-50071",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50071"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2024-56180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56180"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2021-3864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3864"
},
{
"name": "CVE-2025-39771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39771"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26648",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26648"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2020-24352",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24352"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2022-49296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49296"
},
{
"name": "CVE-2024-49914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49914"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-36407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36407"
},
{
"name": "CVE-2024-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0217"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2021-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47658"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2019-12067",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12067"
},
{
"name": "CVE-2024-57843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57843"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2024-50135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50135"
},
{
"name": "CVE-2024-49916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49916"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2024-49988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49988"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2024-49861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49861"
},
{
"name": "CVE-2026-23093",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23093"
},
{
"name": "CVE-2024-49893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49893"
},
{
"name": "CVE-2024-44963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44963"
},
{
"name": "CVE-2023-53348",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53348"
},
{
"name": "CVE-2022-48766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48766"
},
{
"name": "CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"name": "CVE-2024-49917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49917"
},
{
"name": "CVE-2022-50467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50467"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2024-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48875"
},
{
"name": "CVE-2024-41935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41935"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53382"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2025-39677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39677"
},
{
"name": "CVE-2023-53651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53651"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2022-50383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50383"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-53387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53387"
},
{
"name": "CVE-2026-31802",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31802"
},
{
"name": "CVE-2024-45774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45774"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2025-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2026-25702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25702"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2022-50863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50863"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2024-35843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35843"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-39762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39762"
},
{
"name": "CVE-2024-40999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40999"
},
{
"name": "CVE-2023-53292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53292"
},
{
"name": "CVE-2023-52576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52576"
},
{
"name": "CVE-2024-27002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-57887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57887"
},
{
"name": "CVE-2025-21730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21730"
},
{
"name": "CVE-2024-35865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35865"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2023-52660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52660"
},
{
"name": "CVE-2024-35995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2023-53371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53371"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22041"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-22127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22127"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2023-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53187"
},
{
"name": "CVE-2025-38689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38689"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2022-48744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48744"
},
{
"name": "CVE-2025-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38070"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-62525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62525"
},
{
"name": "CVE-2025-71238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
},
{
"name": "CVE-2021-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0175"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"name": "CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2024-56592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-38189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38189"
},
{
"name": "CVE-2022-48628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48628"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2021-44534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44534"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2024-56565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56565"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2024-57872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57872"
},
{
"name": "CVE-2023-28720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28720"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2024-46833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46833"
},
{
"name": "CVE-2024-47703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47703"
},
{
"name": "CVE-2023-53742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53742"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38041"
},
{
"name": "CVE-2024-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
},
{
"name": "CVE-2024-56588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56588"
},
{
"name": "CVE-2023-53452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53452"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2022-50616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50616"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2023-53544",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53544"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2024-49911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49911"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2022-50708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50708"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
},
{
"name": "CVE-2025-9301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9301"
}
],
"initial_release_date": "2026-03-19T00:00:00",
"last_revision_date": "2026-03-19T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0316",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37219",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37219"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37211",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37211"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37215",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37215"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37218",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37218"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37220",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37220"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37216",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37216"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37221",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37221"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37213",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37213"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37217",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37217"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37212",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37212"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37214",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37214"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37222",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37222"
}
]
}
CERTFR-2026-AVI-0326
Vulnerability from certfr_avis - Published: 2026-03-20 - Updated: 2026-03-20
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 6.0.26+LTS-T | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.3.6 | ||
| VMware | Tanzu Platform | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.6.9 | ||
| VMware | N/A | Python Buildpack versions antérieures à 1.8.83 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 3.1.9 | ||
| VMware | Tanzu Platform | Tanzu RabbitMQ sur Tanzu Platform versions antérieures à 2.4.4 | ||
| VMware | N/A | PHP Buildpack versions antérieures à 4.6.69 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 3.2.5 | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.9+LTS-T | ||
| VMware | Tanzu Platform | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.17 | ||
| VMware | Tanzu Platform | Tanzu RabbitMQ pour Tanzu Platform versions antérieures à 10.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 2.4.6 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 1.16.18 | ||
| VMware | Tanzu Platform | Tanzu for Valkey sur Tanzu Platform versions antérieures à 10.2.2 | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 6.0.26+LTS-T | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.2.9+LTS-T | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.3.6 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.26+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.6.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.83",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ sur Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.69",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.5",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.9+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.17",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.2",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.18",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for Valkey sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.2",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.26+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.9+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-28422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28422"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-35875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35875"
},
{
"name": "CVE-2022-50759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50759"
},
{
"name": "CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-36026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36026"
},
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2023-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3640"
},
{
"name": "CVE-2024-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27435"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2024-42122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2026-28420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28420"
},
{
"name": "CVE-2022-49069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49069"
},
{
"name": "CVE-2024-57875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57875"
},
{
"name": "CVE-2022-27943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-54129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54129"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-49543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49543"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2023-53562",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53562"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2024-50063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50063"
},
{
"name": "CVE-2023-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33875"
},
{
"name": "CVE-2024-41001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41001"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-36353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36353"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2023-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53247"
},
{
"name": "CVE-2025-38042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38042"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2023-53829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53829"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-54002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54002"
},
{
"name": "CVE-2022-50550",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50550"
},
{
"name": "CVE-2022-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0400"
},
{
"name": "CVE-2022-49138",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49138"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2022-49359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49359"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2022-48673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48673"
},
{
"name": "CVE-2022-50425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50425"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2024-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39293"
},
{
"name": "CVE-2023-53008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53008"
},
{
"name": "CVE-2025-38669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38669"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2024-38306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38306"
},
{
"name": "CVE-2023-53733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53733"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2023-1386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1386"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-56703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
},
{
"name": "CVE-2026-23098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23098"
},
{
"name": "CVE-2023-53347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53347"
},
{
"name": "CVE-2023-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28374"
},
{
"name": "CVE-2023-52926",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52926"
},
{
"name": "CVE-2026-32597",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32597"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2026-25500",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25500"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27558"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0076"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2024-58237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58237"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2023-53529",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53529"
},
{
"name": "CVE-2024-50028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50028"
},
{
"name": "CVE-2023-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53042"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-58094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2025-52534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52534"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2024-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46705"
},
{
"name": "CVE-2022-50407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50407"
},
{
"name": "CVE-2026-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23196"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"name": "CVE-2024-45775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45775"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2022-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49901"
},
{
"name": "CVE-2026-23126",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23126"
},
{
"name": "CVE-2025-38329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38329"
},
{
"name": "CVE-2021-33096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33096"
},
{
"name": "CVE-2022-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50230"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2023-53588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53588"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-37870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2022-49533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49533"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2020-26557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26557"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2021-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33114"
},
{
"name": "CVE-2025-69645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69645"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2022-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49125"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2024-26866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26866"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2023-52561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52561"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53221"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2026-24734",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24734"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2023-53362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53362"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2024-26756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26756"
},
{
"name": "CVE-2022-50815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50815"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-38036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38036"
},
{
"name": "CVE-2025-2668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2668"
},
{
"name": "CVE-2025-71221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71221"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2024-46860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46860"
},
{
"name": "CVE-2025-22040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22040"
},
{
"name": "CVE-2024-53095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53095"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2024-56665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56665"
},
{
"name": "CVE-2025-38340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38340"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-53629",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53629"
},
{
"name": "CVE-2022-50178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50178"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2025-37880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37880"
},
{
"name": "CVE-2025-36427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36427"
},
{
"name": "CVE-2026-23217",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23217"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-37833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53320"
},
{
"name": "CVE-2024-44961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44961"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2025-21656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21656"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2025-69650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69650"
},
{
"name": "CVE-2022-50554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50554"
},
{
"name": "CVE-2023-53509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53509"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2024-46775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46775"
},
{
"name": "CVE-2025-39764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39764"
},
{
"name": "CVE-2025-38207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38207"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2024-26807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26807"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-49742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49742"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2024-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52560"
},
{
"name": "CVE-2024-56604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56604"
},
{
"name": "CVE-2026-23227",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23227"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2023-52508",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52508"
},
{
"name": "CVE-2025-69647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69647"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2024-50014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50014"
},
{
"name": "CVE-2022-49108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49108"
},
{
"name": "CVE-2024-56677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56677"
},
{
"name": "CVE-2025-38717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38717"
},
{
"name": "CVE-2026-3497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3497"
},
{
"name": "CVE-2025-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22019"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2024-26767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2026-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2219"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2024-35926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35926"
},
{
"name": "CVE-2024-27389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27389"
},
{
"name": "CVE-2024-26983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26983"
},
{
"name": "CVE-2022-50627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50627"
},
{
"name": "CVE-2024-50285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50285"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38029"
},
{
"name": "CVE-2022-49123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49123"
},
{
"name": "CVE-2024-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50289"
},
{
"name": "CVE-2023-53258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53258"
},
{
"name": "CVE-2024-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46813"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47658"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2025-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38096"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2023-53429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53429"
},
{
"name": "CVE-2024-46765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46765"
},
{
"name": "CVE-2022-50380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50380"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2022-48990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48990"
},
{
"name": "CVE-2024-24864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24864"
},
{
"name": "CVE-2024-35832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35832"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2026-23220",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23220"
},
{
"name": "CVE-2024-45782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45782"
},
{
"name": "CVE-2022-50785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50785"
},
{
"name": "CVE-2025-39745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39745"
},
{
"name": "CVE-2024-35799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35799"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-71223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71223"
},
{
"name": "CVE-2025-36098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36098"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2023-53325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53325"
},
{
"name": "CVE-2025-21752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21752"
},
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-39282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39282"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2024-40975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40975"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2023-46316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46316"
},
{
"name": "CVE-2024-47866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47866"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-39925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39925"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-68794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68794"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2022-48667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48667"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2024-56744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56744"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2022-49161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49161"
},
{
"name": "CVE-2021-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21240"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2023-52485",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52485"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2022-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49997"
},
{
"name": "CVE-2022-49469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49469"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2022-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0480"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2024-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49932"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-1272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1272"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2022-49651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49651"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2024-26770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26770"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2024-27041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27041"
},
{
"name": "CVE-2025-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36184"
},
{
"name": "CVE-2026-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3195"
},
{
"name": "CVE-2025-37743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
},
{
"name": "CVE-2025-40005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40005"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-26242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26242"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-52673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52673"
},
{
"name": "CVE-2024-56722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56722"
},
{
"name": "CVE-2021-33113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33113"
},
{
"name": "CVE-2022-48668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48668"
},
{
"name": "CVE-2024-27418",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27418"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2025-14177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14177"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-68806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68806"
},
{
"name": "CVE-2022-50322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50322"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2022-27635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27635"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2024-49922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49922"
},
{
"name": "CVE-2020-12317",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12317"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2024-49909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49909"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2026-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2391"
},
{
"name": "CVE-2021-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4095"
},
{
"name": "CVE-2022-50240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50240"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2024-45015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45015"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71074"
},
{
"name": "CVE-2025-38673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38673"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-11234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11234"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2023-53447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53447"
},
{
"name": "CVE-2024-46754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46754"
},
{
"name": "CVE-2021-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0161"
},
{
"name": "CVE-2018-1121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1121"
},
{
"name": "CVE-2022-49547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49547"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2025-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0622"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-26757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26757"
},
{
"name": "CVE-2024-49899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49899"
},
{
"name": "CVE-2022-49484",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49484"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2023-53248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53248"
},
{
"name": "CVE-2024-56788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56788"
},
{
"name": "CVE-2016-8660",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8660"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-7519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7519"
},
{
"name": "CVE-2023-53491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53491"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49908"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2026-28421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28421"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2026-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27171"
},
{
"name": "CVE-2022-50811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50811"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2023-53366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53366"
},
{
"name": "CVE-2022-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2022-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49203"
},
{
"name": "CVE-2024-40918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40918"
},
{
"name": "CVE-2024-27032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27032"
},
{
"name": "CVE-2022-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50236"
},
{
"name": "CVE-2024-35932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35932"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2026-23137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23137"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-37882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37882"
},
{
"name": "CVE-2024-35971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35971"
},
{
"name": "CVE-2024-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46762"
},
{
"name": "CVE-2023-34983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34983"
},
{
"name": "CVE-2024-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35868"
},
{
"name": "CVE-2023-53323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53323"
},
{
"name": "CVE-2026-3731",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3731"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2023-52857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2022-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50304"
},
{
"name": "CVE-2026-23226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23226"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2024-43844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43844"
},
{
"name": "CVE-2023-52920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52920"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2021-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0072"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-69652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69652"
},
{
"name": "CVE-2025-21635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38353"
},
{
"name": "CVE-2025-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36009"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2023-52761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52761"
},
{
"name": "CVE-2022-49773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49773"
},
{
"name": "CVE-2023-53609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53609"
},
{
"name": "CVE-2023-53478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53478"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2023-53682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53682"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2026-3442",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3442"
},
{
"name": "CVE-2024-58238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58238"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-22039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22039"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39933"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2022-49722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49722"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2024-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35945"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2020-35501",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35501"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2023-52624",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52624"
},
{
"name": "CVE-2024-56557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56557"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2023-52632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52632"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-36070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36070"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2023-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53198"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2022-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50234"
},
{
"name": "CVE-2025-38082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38082"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-49934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49934"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2026-23066",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23066"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2023-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4969"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-53789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53789"
},
{
"name": "CVE-2022-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-36428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36428"
},
{
"name": "CVE-2023-53520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53520"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2024-35803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35803"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2024-8612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8612"
},
{
"name": "CVE-2023-52586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52586"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2021-33110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33110"
},
{
"name": "CVE-2025-37834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37834"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2019-19378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19378"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2025-38426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38426"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2026-23236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23236"
},
{
"name": "CVE-2023-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
},
{
"name": "CVE-2025-22090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2021-31615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31615"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49932"
},
{
"name": "CVE-2022-25837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25837"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2024-49939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49939"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2023-52831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52831"
},
{
"name": "CVE-2023-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53221"
},
{
"name": "CVE-2024-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26719"
},
{
"name": "CVE-2022-44034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44034"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53072"
},
{
"name": "CVE-2023-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2007"
},
{
"name": "CVE-2022-37341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37341"
},
{
"name": "CVE-2025-69648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69648"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2024-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50298"
},
{
"name": "CVE-2025-36424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36424"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2024-46843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46843"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-36387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36387"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-53602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53602"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2023-53867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53867"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2025-37926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37926"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2025-38038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38038"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2023-33053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33053"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2026-24051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24051"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2025-38261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38261"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-69644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69644"
},
{
"name": "CVE-2022-49303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49303"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2025-11961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11961"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2022-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3114"
},
{
"name": "CVE-2023-52916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52916"
},
{
"name": "CVE-2025-38064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38064"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2022-50628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50628"
},
{
"name": "CVE-2024-56718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2022-50350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50350"
},
{
"name": "CVE-2025-21831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21831"
},
{
"name": "CVE-2022-50721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50721"
},
{
"name": "CVE-2022-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50095"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2026-3196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3196"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2024-50217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50217"
},
{
"name": "CVE-2021-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0168"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2022-50479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50479"
},
{
"name": "CVE-2022-50583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50583"
},
{
"name": "CVE-2025-37806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37806"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2023-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0030"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2024-53179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53179"
},
{
"name": "CVE-2024-57945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57945"
},
{
"name": "CVE-2023-54233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54233"
},
{
"name": "CVE-2024-43899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43899"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2019-15213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2022-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49935"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2022-49534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49534"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-53010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53010"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-57888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57888"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2023-54237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54237"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49134"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2022-49333",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49333"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2025-27111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27111"
},
{
"name": "CVE-2024-49994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2019-19814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19814"
},
{
"name": "CVE-2022-49136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49136"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-44962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44962"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2024-35931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35931"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2026-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23138"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2026-1703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1703"
},
{
"name": "CVE-2023-26551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26551"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53210"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2022-49342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49342"
},
{
"name": "CVE-2015-8553",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8553"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2023-53332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53332"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-58095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2022-49471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49471"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2025-21751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21751"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2026-23234",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23234"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2024-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
},
{
"name": "CVE-2025-23162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23162"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2025-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46727"
},
{
"name": "CVE-2017-13694",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13694"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2026-23212",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23212"
},
{
"name": "CVE-2013-7445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7445"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2023-52701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52701"
},
{
"name": "CVE-2024-49906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49906"
},
{
"name": "CVE-2024-26647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26647"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2024-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47809"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2022-49317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49317"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2018-12928",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12928"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-56607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56607"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2024-49904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49904"
},
{
"name": "CVE-2023-53671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53671"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2024-26938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26938"
},
{
"name": "CVE-2026-28417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28417"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2023-29942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29942"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2022-48633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48633"
},
{
"name": "CVE-2022-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3238"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2026-22185",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22185"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2023-53584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53584"
},
{
"name": "CVE-2024-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57809"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2024-56719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
},
{
"name": "CVE-2022-50418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50418"
},
{
"name": "CVE-2023-53438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53438"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2023-53460",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53460"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2024-56671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56671"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2022-49562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49562"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2023-53483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53483"
},
{
"name": "CVE-2023-53673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53673"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-37746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37746"
},
{
"name": "CVE-2022-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38076"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2024-56368",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-49172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49172"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-40979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40979"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2026-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23240"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2026-23228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23228"
},
{
"name": "CVE-2024-49945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49945"
},
{
"name": "CVE-2022-44033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44033"
},
{
"name": "CVE-2024-56757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56757"
},
{
"name": "CVE-2023-53662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53662"
},
{
"name": "CVE-2025-38069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38069"
},
{
"name": "CVE-2022-49750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49750"
},
{
"name": "CVE-2023-53707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53707"
},
{
"name": "CVE-2023-53115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53115"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2022-48646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48646"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-35808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35808"
},
{
"name": "CVE-2024-58012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58012"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-68772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68772"
},
{
"name": "CVE-2024-49891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49891"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2022-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48887"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-26948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26948"
},
{
"name": "CVE-2023-53370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53370"
},
{
"name": "CVE-2024-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53187"
},
{
"name": "CVE-2023-45929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45929"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2024-57795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57795"
},
{
"name": "CVE-2025-37855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37855"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2021-33115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33115"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2020-26559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26559"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-32249",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32249"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2024-43831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
},
{
"name": "CVE-2023-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-38330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38330"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2017-13693",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13693"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2022-49306",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49306"
},
{
"name": "CVE-2024-49898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49898"
},
{
"name": "CVE-2025-36423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36423"
},
{
"name": "CVE-2022-49622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49622"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-50211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50211"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2022-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50284"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
},
{
"name": "CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"name": "CVE-2024-27035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27035"
},
{
"name": "CVE-2023-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53218"
},
{
"name": "CVE-2022-25836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25836"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-29934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29934"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2022-49133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-38438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38438"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2023-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26555"
},
{
"name": "CVE-2023-1193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1193"
},
{
"name": "CVE-2025-71220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71220"
},
{
"name": "CVE-2024-46806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46806"
},
{
"name": "CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2026-23103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23103"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-68786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68786"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2022-50393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50393"
},
{
"name": "CVE-2025-68779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68779"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-21819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
},
{
"name": "CVE-2025-48514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48514"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2024-47664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47664"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2026-25749",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25749"
},
{
"name": "CVE-2024-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49504"
},
{
"name": "CVE-2025-38118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53367"
},
{
"name": "CVE-2022-50500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50500"
},
{
"name": "CVE-2019-14899",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14899"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2024-53098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53098"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2026-23180",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23180"
},
{
"name": "CVE-2021-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0164"
},
{
"name": "CVE-2026-26958",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26958"
},
{
"name": "CVE-2024-46870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46870"
},
{
"name": "CVE-2022-49178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49178"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-49929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49929"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2022-49173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49173"
},
{
"name": "CVE-2024-45781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45781"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2024-53056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53056"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2026-26269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26269"
},
{
"name": "CVE-2024-43872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43872"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2023-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52939"
},
{
"name": "CVE-2024-14027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-14027"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-69649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69649"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2022-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49766"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-22043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22043"
},
{
"name": "CVE-2024-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49569"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2024-56609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56609"
},
{
"name": "CVE-2022-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49940"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2024-56611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56611"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2020-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25743"
},
{
"name": "CVE-2022-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50167"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2026-27704",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27704"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2023-45896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45896"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2024-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2021-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3735"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2024-46861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46861"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2022-50634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50634"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-54514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54514"
},
{
"name": "CVE-2025-71202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71202"
},
{
"name": "CVE-2015-7837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7837"
},
{
"name": "CVE-2025-0677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0677"
},
{
"name": "CVE-2024-45780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45780"
},
{
"name": "CVE-2024-46749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46749"
},
{
"name": "CVE-2022-50492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50492"
},
{
"name": "CVE-2024-49888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49888"
},
{
"name": "CVE-2022-50406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50406"
},
{
"name": "CVE-2023-26552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26552"
},
{
"name": "CVE-2024-49921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49921"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-59691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59691"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2023-52481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52481"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2025-22057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2024-50056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2026-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1788"
},
{
"name": "CVE-2023-53721",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53721"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2022-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50256"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-37907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37907"
},
{
"name": "CVE-2024-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38625"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2023-4010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4010"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2024-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46727"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2023-54105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54105"
},
{
"name": "CVE-2018-17977",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17977"
},
{
"name": "CVE-2019-1010204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010204"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2022-50354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50354"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2026-23216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
},
{
"name": "CVE-2023-53434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53434"
},
{
"name": "CVE-2023-29935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29935"
},
{
"name": "CVE-2023-35061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2026-21636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21636"
},
{
"name": "CVE-2026-23239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23239"
},
{
"name": "CVE-2021-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0172"
},
{
"name": "CVE-2024-47662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47662"
},
{
"name": "CVE-2018-12930",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12930"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2024-49970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49970"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2023-32644",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32644"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2024-46681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46681"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-40012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40012"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2024-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47141"
},
{
"name": "CVE-2024-8354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8354"
},
{
"name": "CVE-2023-54323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54323"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2025-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0689"
},
{
"name": "CVE-2022-50316",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50316"
},
{
"name": "CVE-2023-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31347"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2023-53657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53657"
},
{
"name": "CVE-2024-49915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49915"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2023-52732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52732"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2022-49167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49167"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2026-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27903"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2025-0690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0690"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2023-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2022-49234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49234"
},
{
"name": "CVE-2022-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50163"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2024-49919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49919"
},
{
"name": "CVE-2026-23238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23238"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2020-26556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26556"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2024-26699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26699"
},
{
"name": "CVE-2024-57876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57876"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2022-50390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50390"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-71186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71186"
},
{
"name": "CVE-2024-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53220"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2023-53539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53539"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-31648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31648"
},
{
"name": "CVE-2025-0678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0678"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2024-56674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56674"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2019-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1563"
},
{
"name": "CVE-2026-1002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1002"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2022-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50166"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2024-56738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56738"
},
{
"name": "CVE-2022-50778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50778"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2022-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49971"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-21693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
},
{
"name": "CVE-2025-71203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71203"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2025-39789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39789"
},
{
"name": "CVE-2022-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2024-56583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56583"
},
{
"name": "CVE-2022-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50195"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-56712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56712"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-52634",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52634"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2025-62526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62526"
},
{
"name": "CVE-2024-49918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49918"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2024-45776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45776"
},
{
"name": "CVE-2022-50090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50090"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2020-14356",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14356"
},
{
"name": "CVE-2025-68745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68745"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-53764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53764"
},
{
"name": "CVE-2024-53687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53687"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2024-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38628"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-38672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38672"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-0684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0684"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2024-47794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2025-38272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38272"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2019-20794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20794"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2022-4543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4543"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2023-53627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53627"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38091"
},
{
"name": "CVE-2023-53510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53510"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2023-53575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53575"
},
{
"name": "CVE-2022-49516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49516"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2022-3523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3523"
},
{
"name": "CVE-2026-26157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26157"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2025-22072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22072"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2026-23193",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23193"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-47736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47736"
},
{
"name": "CVE-2023-53037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53037"
},
{
"name": "CVE-2024-46842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46842"
},
{
"name": "CVE-2025-71237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71237"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2024-50112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50112"
},
{
"name": "CVE-2025-69646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69646"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2026-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23215"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2020-26142",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26142"
},
{
"name": "CVE-2022-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49955"
},
{
"name": "CVE-2023-53628",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53628"
},
{
"name": "CVE-2025-29943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29943"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-38140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38140"
},
{
"name": "CVE-2022-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50002"
},
{
"name": "CVE-2025-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38621"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39908"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2024-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49920"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2026-23118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23118"
},
{
"name": "CVE-2025-34034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34034"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-59692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59692"
},
{
"name": "CVE-2022-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50116"
},
{
"name": "CVE-2018-12931",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12931"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2022-50224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50224"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-13791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13791"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2024-49990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49990"
},
{
"name": "CVE-2020-15802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15802"
},
{
"name": "CVE-2020-24240",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24240"
},
{
"name": "CVE-2024-46718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46718"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2023-53545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53545"
},
{
"name": "CVE-2022-50552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50552"
},
{
"name": "CVE-2021-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0066"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2023-53376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53376"
},
{
"name": "CVE-2023-53538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53538"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2022-50357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50357"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2023-52671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52671"
},
{
"name": "CVE-2022-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50303"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2023-52676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52676"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2017-13165",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13165"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-46811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46811"
},
{
"name": "CVE-2025-21985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
},
{
"name": "CVE-2025-22109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2023-53635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53635"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-23132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23132"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2022-49531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49531"
},
{
"name": "CVE-2022-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49504"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2022-49810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-71109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71109"
},
{
"name": "CVE-2023-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26586"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-44950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44950"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2022-50332",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50332"
},
{
"name": "CVE-2023-53822",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53822"
},
{
"name": "CVE-2024-27408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27408"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2022-50461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50461"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2023-26554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26554"
},
{
"name": "CVE-2025-38486",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38486"
},
{
"name": "CVE-2021-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26934"
},
{
"name": "CVE-2023-53466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53466"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53168"
},
{
"name": "CVE-2022-49528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49528"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-49218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49218"
},
{
"name": "CVE-2023-52749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52749"
},
{
"name": "CVE-2025-39754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39754"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2022-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49967"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2022-49245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49245"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2023-52682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52682"
},
{
"name": "CVE-2022-50871",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50871"
},
{
"name": "CVE-2025-71150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71150"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2025-39958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39958"
},
{
"name": "CVE-2018-8956",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8956"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2022-49420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49420"
},
{
"name": "CVE-2022-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40964"
},
{
"name": "CVE-2025-69873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69873"
},
{
"name": "CVE-2026-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3441"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2023-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53149"
},
{
"name": "CVE-2026-23237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23237"
},
{
"name": "CVE-2024-49987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49987"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2022-50746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50746"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2024-50034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50034"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2023-53596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53596"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2022-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50260"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2020-12319",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12319"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2023-3397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3397"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2024-26672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26672"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2021-33139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33139"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2024-50057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50057"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2024-46808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46808"
},
{
"name": "CVE-2026-26158",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26158"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-38168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38168"
},
{
"name": "CVE-2023-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53547"
},
{
"name": "CVE-2019-20426",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20426"
},
{
"name": "CVE-2025-71107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71107"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2026-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29786"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-56584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56584"
},
{
"name": "CVE-2026-23235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23235"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-71152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71152"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-56692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56692"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2022-50212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50212"
},
{
"name": "CVE-2026-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23087"
},
{
"name": "CVE-2023-54259",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54259"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2025-1369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1369"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2022-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2961"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-49635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
},
{
"name": "CVE-2024-50017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50017"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2024-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
},
{
"name": "CVE-2025-14180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14180"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-33155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33155"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2024-57899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57899"
},
{
"name": "CVE-2024-49928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49928"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36001"
},
{
"name": "CVE-2022-50464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50464"
},
{
"name": "CVE-2025-38674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38674"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2020-26560",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26560"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-45777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45777"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2022-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49965"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2024-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0564"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2022-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49961"
},
{
"name": "CVE-2025-69651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69651"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2024-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58098"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2022-28667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28667"
},
{
"name": "CVE-2023-53383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53383"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2026-23164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23164"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2025-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0033"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2024-42319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42319"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-13716",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13716"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-36024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36024"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2025-38440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38440"
},
{
"name": "CVE-2026-23124",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23124"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2024-53224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53224"
},
{
"name": "CVE-2024-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49910"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2023-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53105"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2024-39286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39286"
},
{
"name": "CVE-2025-25184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25184"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2024-47689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47689"
},
{
"name": "CVE-2025-71160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71160"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2023-52625",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52625"
},
{
"name": "CVE-2023-53353",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53353"
},
{
"name": "CVE-2024-58096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2023-53401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53401"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2023-53702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53702"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2023-54059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54059"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2021-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0170"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-53133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53133"
},
{
"name": "CVE-2026-23075",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23075"
},
{
"name": "CVE-2022-50571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50571"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2026-23120",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23120"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2022-49393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49393"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-71204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71204"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-26758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2023-32651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32651"
},
{
"name": "CVE-2025-37747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2023-53036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53036"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-71115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71115"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2025-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1118"
},
{
"name": "CVE-2024-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50166"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2023-53355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53355"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2026-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23181"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2023-53558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53558"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-22860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22860"
},
{
"name": "CVE-2025-36365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36365"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2025-0686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0686"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2025-68781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68781"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2021-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0173"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2024-45778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45778"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2024-47661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47661"
},
{
"name": "CVE-2026-28418",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28418"
},
{
"name": "CVE-2023-54151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54151"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2024-46803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46803"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2022-36351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36351"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2026-25639",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25639"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2024-54683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-26658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26658"
},
{
"name": "CVE-2026-2243",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2243"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2021-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0174"
},
{
"name": "CVE-2025-8746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8746"
},
{
"name": "CVE-2025-36442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36442"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2026-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0968"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-45779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45779"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-57857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57857"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-50213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50213"
},
{
"name": "CVE-2024-46823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46823"
},
{
"name": "CVE-2023-32642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32642"
},
{
"name": "CVE-2025-71227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71227"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2022-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50015"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2024-7883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7883"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2022-50772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50772"
},
{
"name": "CVE-2024-56717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56717"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-45885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45885"
},
{
"name": "CVE-2022-49783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2025-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47153"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2024-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53216"
},
{
"name": "CVE-2022-49539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49539"
},
{
"name": "CVE-2024-36347",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36347"
},
{
"name": "CVE-2024-26869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2021-20255",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20255"
},
{
"name": "CVE-2022-48979",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48979"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-71193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71193"
},
{
"name": "CVE-2023-54180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54180"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2023-25951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25951"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2023-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53152"
},
{
"name": "CVE-2021-0308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0308"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2024-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50009"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2023-45927",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45927"
},
{
"name": "CVE-2020-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25742"
},
{
"name": "CVE-2022-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0987"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-38199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38199"
},
{
"name": "CVE-2025-39905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39905"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2022-50720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50720"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2022-49529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49529"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2024-26876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26876"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2023-52657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52657"
},
{
"name": "CVE-2025-37876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37876"
},
{
"name": "CVE-2024-58089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58089"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2026-27571",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27571"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2022-49127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49127"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2020-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25741"
},
{
"name": "CVE-2022-50748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50748"
},
{
"name": "CVE-2023-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53767"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2023-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53180"
},
{
"name": "CVE-2026-28419",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28419"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2023-53385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53385"
},
{
"name": "CVE-2026-23206",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23206"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2024-46678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46678"
},
{
"name": "CVE-2024-58097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
},
{
"name": "CVE-2023-53620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53620"
},
{
"name": "CVE-2022-50539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50539"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2022-49496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49496"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2024-56782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56782"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2023-53540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53540"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-53261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53261"
},
{
"name": "CVE-2026-24049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24049"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2023-54187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54187"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2022-44032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44032"
},
{
"name": "CVE-2024-57895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57895"
},
{
"name": "CVE-2023-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53240"
},
{
"name": "CVE-2025-13735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13735"
},
{
"name": "CVE-2023-53694",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53694"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2024-35794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35794"
},
{
"name": "CVE-2023-52829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52829"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-56660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56660"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2025-38033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38033"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-47704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47704"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2025-36366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36366"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2025-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36123"
},
{
"name": "CVE-2024-56737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56737"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2020-11935",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11935"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-22042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22042"
},
{
"name": "CVE-2025-71158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71158"
},
{
"name": "CVE-2022-49803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49803"
},
{
"name": "CVE-2024-57898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57898"
},
{
"name": "CVE-2020-35503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35503"
},
{
"name": "CVE-2024-49923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49923"
},
{
"name": "CVE-2024-56639",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56639"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-53002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53002"
},
{
"name": "CVE-2021-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0183"
},
{
"name": "CVE-2025-39884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39884"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"name": "CVE-2024-35826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35826"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2022-49764",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49764"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-21651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21651"
},
{
"name": "CVE-2025-38092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38092"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2023-26553",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26553"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-37776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37776"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2024-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6519"
},
{
"name": "CVE-2024-46729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46729"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50266"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2023-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2022-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50009"
},
{
"name": "CVE-2022-26047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26047"
},
{
"name": "CVE-2024-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-37877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37877"
},
{
"name": "CVE-2024-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2193"
},
{
"name": "CVE-2025-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4382"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2025-71161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71161"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-22038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22038"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2026-27141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27141"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-50518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50518"
},
{
"name": "CVE-2022-49829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49829"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2016-2568",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2568"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2018-12929",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12929"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2024-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53147"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2024-45783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45783"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2023-53410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53410"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2025-68809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68809"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2021-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0165"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2022-49177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49177"
},
{
"name": "CVE-2025-38205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38205"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2024-58241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58241"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2022-49833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49833"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-68817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68817"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2024-53079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53079"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1125"
},
{
"name": "CVE-2023-53647",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53647"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0012"
},
{
"name": "CVE-2020-12313",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12313"
},
{
"name": "CVE-2025-71233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71233"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2021-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0166"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2022-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3872"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2024-49931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49931"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2025-27610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27610"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2026-23031",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23031"
},
{
"name": "CVE-2024-46730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46730"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2024-46728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46728"
},
{
"name": "CVE-2023-53561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53561"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2026-23050",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23050"
},
{
"name": "CVE-2024-58100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58100"
},
{
"name": "CVE-2020-0256",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0256"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-26954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26954"
},
{
"name": "CVE-2025-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21634"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2025-38047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38047"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2017-0537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0537"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2023-26112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26112"
},
{
"name": "CVE-2018-6952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6952"
},
{
"name": "CVE-2020-14304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14304"
},
{
"name": "CVE-2024-46834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46834"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2026-24001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24001"
},
{
"name": "CVE-2025-37807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37807"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2022-50016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50016"
},
{
"name": "CVE-2025-29481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29481"
},
{
"name": "CVE-2024-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53219"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2024-25740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25740"
},
{
"name": "CVE-2024-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-14178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14178"
},
{
"name": "CVE-2024-57950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57950"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2021-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0176"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2022-48998",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48998"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49974"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2019-20633",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20633"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2021-3714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3714"
},
{
"name": "CVE-2023-54071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54071"
},
{
"name": "CVE-2024-56566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56566"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-47745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47745"
},
{
"name": "CVE-2025-39833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39833"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2024-53190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53190"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2024-35784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35784"
},
{
"name": "CVE-2024-56591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56591"
},
{
"name": "CVE-2024-56544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56544"
},
{
"name": "CVE-2024-56647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56647"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2024-57976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57976"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0685"
},
{
"name": "CVE-2024-57893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57893"
},
{
"name": "CVE-2026-23231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2022-50071",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50071"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2024-56180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56180"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2021-3864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3864"
},
{
"name": "CVE-2025-39771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39771"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26648",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26648"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2020-24352",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24352"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2022-49296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49296"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2024-49914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49914"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-36407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36407"
},
{
"name": "CVE-2024-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0217"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2021-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47658"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2025-4575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4575"
},
{
"name": "CVE-2019-12067",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12067"
},
{
"name": "CVE-2024-57843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57843"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2024-50135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50135"
},
{
"name": "CVE-2024-49916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49916"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2024-49988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49988"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2024-49861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49861"
},
{
"name": "CVE-2026-23093",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23093"
},
{
"name": "CVE-2024-49893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49893"
},
{
"name": "CVE-2024-44963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44963"
},
{
"name": "CVE-2023-53348",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53348"
},
{
"name": "CVE-2022-48766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48766"
},
{
"name": "CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"name": "CVE-2024-49917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49917"
},
{
"name": "CVE-2022-50467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50467"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-32441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32441"
},
{
"name": "CVE-2024-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48875"
},
{
"name": "CVE-2024-41935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41935"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53382"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2025-39677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39677"
},
{
"name": "CVE-2023-53651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53651"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2022-50383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50383"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-53387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53387"
},
{
"name": "CVE-2026-31802",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31802"
},
{
"name": "CVE-2024-45774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45774"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2025-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
},
{
"name": "CVE-2025-13465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13465"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2026-25702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25702"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2022-50863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50863"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2024-35843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35843"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-39762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39762"
},
{
"name": "CVE-2024-40999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40999"
},
{
"name": "CVE-2023-53292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53292"
},
{
"name": "CVE-2023-52576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52576"
},
{
"name": "CVE-2024-27002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-57887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57887"
},
{
"name": "CVE-2025-21730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21730"
},
{
"name": "CVE-2024-35865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35865"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2023-52660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52660"
},
{
"name": "CVE-2024-35995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2023-53371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53371"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22041"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-22127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22127"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2023-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53187"
},
{
"name": "CVE-2025-38689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38689"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2022-48744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48744"
},
{
"name": "CVE-2025-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38070"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-62525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62525"
},
{
"name": "CVE-2025-71238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
},
{
"name": "CVE-2021-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0175"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"name": "CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2024-56592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-38189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38189"
},
{
"name": "CVE-2022-48628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48628"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2021-44534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44534"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2024-56565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56565"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2024-57872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57872"
},
{
"name": "CVE-2023-28720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28720"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2024-46833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46833"
},
{
"name": "CVE-2024-47703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47703"
},
{
"name": "CVE-2023-53742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53742"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38041"
},
{
"name": "CVE-2024-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
},
{
"name": "CVE-2024-56588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56588"
},
{
"name": "CVE-2023-53452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53452"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2022-50616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50616"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2023-53544",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53544"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2024-49911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49911"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2022-50708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50708"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
},
{
"name": "CVE-2025-9301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9301"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2026-03-20T00:00:00",
"last_revision_date": "2026-03-20T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0326",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37233",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37233"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37237",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37237"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37236",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37236"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37246",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37246"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37235",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37235"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37229",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37229"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37226",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37226"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37230",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37230"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37242",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37242"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37228",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37228"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37240",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37240"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37243",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37243"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37234",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37234"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37231",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37231"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37239",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37239"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37227",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37227"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37232",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37232"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37247",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37247"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37241",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37241"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37238",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37238"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37244",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37244"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37245",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37245"
}
]
}
FKIE_CVE-2026-23239
Vulnerability from fkie_nvd - Published: 2026-03-10 18:18 - Updated: 2026-04-02 15:16| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/022ff7f347588de6e17879a1da6019647b21321b | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/664e9df53226b4505a0894817ecad2c610ab11d8 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/e1512c1db9e8794d8d130addd2615ec27231d994 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/f7ad8b1d0e421c524604d5076b73232093490d5c |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nespintcp: Fix race condition in espintcp_close()\n\nThis issue was discovered during a code audit.\n\nAfter cancel_work_sync() is called from espintcp_close(),\nespintcp_tx_work() can still be scheduled from paths such as\nthe Delayed ACK handler or ksoftirqd.\nAs a result, the espintcp_tx_work() worker may dereference a\nfreed espintcp ctx or sk.\n\nThe following is a simple race scenario:\n\n cpu0 cpu1\n\n espintcp_close()\n cancel_work_sync(\u0026ctx-\u003ework);\n espintcp_write_space()\n schedule_work(\u0026ctx-\u003ework);\n\nTo prevent this race condition, cancel_work_sync() is\nreplaced with disable_work_sync()."
},
{
"lang": "es",
"value": "En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\nespintcp: Correcci\u00f3n de condici\u00f3n de carrera en espintcp_close()\n\nEste problema fue descubierto durante una auditor\u00eda de c\u00f3digo.\n\nDespu\u00e9s de que se llama a cancel_work_sync() desde espintcp_close(), espintcp_tx_work() a\u00fan puede ser programado desde rutas como el gestor de ACK Retrasado o ksoftirqd.\nComo resultado, el trabajador espintcp_tx_work() puede desreferenciar un ctx o sk de espintcp liberado.\n\nEl siguiente es un escenario de condici\u00f3n de carrera simple:\n\n cpu0 cpu1\n\n espintcp_close()\n cancel_work_sync(\u0026amp;ctx-\u0026gt;work);\n espintcp_write_space()\n schedule_work(\u0026amp;ctx-\u0026gt;work);\n\nPara prevenir esta condici\u00f3n de carrera, cancel_work_sync() es reemplazado por disable_work_sync()."
}
],
"id": "CVE-2026-23239",
"lastModified": "2026-04-02T15:16:25.183",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"type": "Secondary"
}
]
},
"published": "2026-03-10T18:18:13.383",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/022ff7f347588de6e17879a1da6019647b21321b"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/664e9df53226b4505a0894817ecad2c610ab11d8"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/e1512c1db9e8794d8d130addd2615ec27231d994"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/f7ad8b1d0e421c524604d5076b73232093490d5c"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
OPENSUSE-SU-2026:10387-1
Vulnerability from csaf_opensuse - Published: 2026-03-18 00:00 - Updated: 2026-03-18 00:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-devel-6.19.8-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-devel-6.19.8-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10387",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10387-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71229 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71230 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71231 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71232 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71233 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71234 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71235 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71235/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71236 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71237 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71237/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71238 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23220 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23220/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23221 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23221/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23222 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23222/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23223 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23223/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23224 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23224/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23225 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23225/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23226 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23226/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23227 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23227/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23228 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23228/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23229 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23229/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23230 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23230/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23231 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23232 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23232/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23233 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23233/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23234 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23235 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23235/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23236 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23236/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23239 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23240 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23240/"
}
],
"title": "kernel-devel-6.19.8-1.1 on GA media",
"tracking": {
"current_release_date": "2026-03-18T00:00:00Z",
"generator": {
"date": "2026-03-18T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10387-1",
"initial_release_date": "2026-03-18T00:00:00Z",
"revision_history": [
{
"date": "2026-03-18T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.19.8-1.1.aarch64",
"product": {
"name": "kernel-devel-6.19.8-1.1.aarch64",
"product_id": "kernel-devel-6.19.8-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.19.8-1.1.aarch64",
"product": {
"name": "kernel-macros-6.19.8-1.1.aarch64",
"product_id": "kernel-macros-6.19.8-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-6.19.8-1.1.aarch64",
"product": {
"name": "kernel-source-6.19.8-1.1.aarch64",
"product_id": "kernel-source-6.19.8-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.19.8-1.1.aarch64",
"product": {
"name": "kernel-source-vanilla-6.19.8-1.1.aarch64",
"product_id": "kernel-source-vanilla-6.19.8-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.19.8-1.1.ppc64le",
"product": {
"name": "kernel-devel-6.19.8-1.1.ppc64le",
"product_id": "kernel-devel-6.19.8-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.19.8-1.1.ppc64le",
"product": {
"name": "kernel-macros-6.19.8-1.1.ppc64le",
"product_id": "kernel-macros-6.19.8-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-6.19.8-1.1.ppc64le",
"product": {
"name": "kernel-source-6.19.8-1.1.ppc64le",
"product_id": "kernel-source-6.19.8-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.19.8-1.1.ppc64le",
"product": {
"name": "kernel-source-vanilla-6.19.8-1.1.ppc64le",
"product_id": "kernel-source-vanilla-6.19.8-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.19.8-1.1.s390x",
"product": {
"name": "kernel-devel-6.19.8-1.1.s390x",
"product_id": "kernel-devel-6.19.8-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.19.8-1.1.s390x",
"product": {
"name": "kernel-macros-6.19.8-1.1.s390x",
"product_id": "kernel-macros-6.19.8-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-6.19.8-1.1.s390x",
"product": {
"name": "kernel-source-6.19.8-1.1.s390x",
"product_id": "kernel-source-6.19.8-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.19.8-1.1.s390x",
"product": {
"name": "kernel-source-vanilla-6.19.8-1.1.s390x",
"product_id": "kernel-source-vanilla-6.19.8-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.19.8-1.1.x86_64",
"product": {
"name": "kernel-devel-6.19.8-1.1.x86_64",
"product_id": "kernel-devel-6.19.8-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.19.8-1.1.x86_64",
"product": {
"name": "kernel-macros-6.19.8-1.1.x86_64",
"product_id": "kernel-macros-6.19.8-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-6.19.8-1.1.x86_64",
"product": {
"name": "kernel-source-6.19.8-1.1.x86_64",
"product_id": "kernel-source-6.19.8-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.19.8-1.1.x86_64",
"product": {
"name": "kernel-source-vanilla-6.19.8-1.1.x86_64",
"product_id": "kernel-source-vanilla-6.19.8-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.19.8-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64"
},
"product_reference": "kernel-devel-6.19.8-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.19.8-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le"
},
"product_reference": "kernel-devel-6.19.8-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.19.8-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x"
},
"product_reference": "kernel-devel-6.19.8-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.19.8-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64"
},
"product_reference": "kernel-devel-6.19.8-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.19.8-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64"
},
"product_reference": "kernel-macros-6.19.8-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.19.8-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le"
},
"product_reference": "kernel-macros-6.19.8-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.19.8-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x"
},
"product_reference": "kernel-macros-6.19.8-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.19.8-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64"
},
"product_reference": "kernel-macros-6.19.8-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.19.8-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64"
},
"product_reference": "kernel-source-6.19.8-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.19.8-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le"
},
"product_reference": "kernel-source-6.19.8-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.19.8-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x"
},
"product_reference": "kernel-source-6.19.8-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.19.8-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64"
},
"product_reference": "kernel-source-6.19.8-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.19.8-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64"
},
"product_reference": "kernel-source-vanilla-6.19.8-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.19.8-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le"
},
"product_reference": "kernel-source-vanilla-6.19.8-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.19.8-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x"
},
"product_reference": "kernel-source-vanilla-6.19.8-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.19.8-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
},
"product_reference": "kernel-source-vanilla-6.19.8-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-71229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71229"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()\n\nrtw_core_enable_beacon() reads 4 bytes from an address that is not a\nmultiple of 4. This results in a crash on some systems.\n\nDo 1 byte reads/writes instead.\n\nUnable to handle kernel paging request at virtual address ffff8000827e0522\nMem abort info:\n ESR = 0x0000000096000021\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x21: alignment fault\nData abort info:\n ISV = 0, ISS = 0x00000021, ISS2 = 0x00000000\n CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\nswapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000005492000\n[ffff8000827e0522] pgd=0000000000000000, p4d=10000001021d9403, pud=10000001021da403, pmd=100000011061c403, pte=00780000f3200f13\nInternal error: Oops: 0000000096000021 [#1] SMP\nModules linked in: [...] rtw88_8822ce rtw88_8822c rtw88_pci rtw88_core [...]\nCPU: 0 UID: 0 PID: 73 Comm: kworker/u32:2 Tainted: G W 6.17.9 #1-NixOS VOLUNTARY\nTainted: [W]=WARN\nHardware name: FriendlyElec NanoPC-T6 LTS (DT)\nWorkqueue: phy0 rtw_c2h_work [rtw88_core]\npstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : rtw_pci_read32+0x18/0x40 [rtw88_pci]\nlr : rtw_core_enable_beacon+0xe0/0x148 [rtw88_core]\nsp : ffff800080cc3ca0\nx29: ffff800080cc3ca0 x28: ffff0001031fc240 x27: ffff000102100828\nx26: ffffd2cb7c9b4088 x25: ffff0001031fc2c0 x24: ffff000112fdef00\nx23: ffff000112fdef18 x22: ffff000111c29970 x21: 0000000000000001\nx20: 0000000000000001 x19: ffff000111c22040 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffd2cb6507c090\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\nx2 : 0000000000007f10 x1 : 0000000000000522 x0 : ffff8000827e0522\nCall trace:\n rtw_pci_read32+0x18/0x40 [rtw88_pci] (P)\n rtw_hw_scan_chan_switch+0x124/0x1a8 [rtw88_core]\n rtw_fw_c2h_cmd_handle+0x254/0x290 [rtw88_core]\n rtw_c2h_work+0x50/0x98 [rtw88_core]\n process_one_work+0x178/0x3f8\n worker_thread+0x208/0x418\n kthread+0x120/0x220\n ret_from_fork+0x10/0x20\nCode: d28fe202 8b020000 f9524400 8b214000 (b9400000)\n---[ end trace 0000000000000000 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71229",
"url": "https://www.suse.com/security/cve/CVE-2025-71229"
},
{
"category": "external",
"summary": "SUSE Bug 1258415 for CVE-2025-71229",
"url": "https://bugzilla.suse.com/1258415"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-71229"
},
{
"cve": "CVE-2025-71230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71230"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfs: ensure sb-\u003es_fs_info is always cleaned up\n\nWhen hfs was converted to the new mount api a bug was introduced by\nchanging the allocation pattern of sb-\u003es_fs_info. If setup_bdev_super()\nfails after a new superblock has been allocated by sget_fc(), but before\nhfs_fill_super() takes ownership of the filesystem-specific s_fs_info\ndata it was leaked.\n\nFix this by freeing sb-\u003es_fs_info in hfs_kill_super().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71230",
"url": "https://www.suse.com/security/cve/CVE-2025-71230"
},
{
"category": "external",
"summary": "SUSE Bug 1258413 for CVE-2025-71230",
"url": "https://bugzilla.suse.com/1258413"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-71230"
},
{
"cve": "CVE-2025-71231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71231"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode\n\nThe local variable \u0027i\u0027 is initialized with -EINVAL, but the for loop\nimmediately overwrites it and -EINVAL is never returned.\n\nIf no empty compression mode can be found, the function would return the\nout-of-bounds index IAA_COMP_MODES_MAX, which would cause an invalid\narray access in add_iaa_compression_mode().\n\nFix both issues by returning either a valid index or -EINVAL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71231",
"url": "https://www.suse.com/security/cve/CVE-2025-71231"
},
{
"category": "external",
"summary": "SUSE Bug 1258424 for CVE-2025-71231",
"url": "https://bugzilla.suse.com/1258424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-71231"
},
{
"cve": "CVE-2025-71232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71232"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Free sp in error path to fix system crash\n\nSystem crash seen during load/unload test in a loop,\n\n[61110.449331] qla2xxx [0000:27:00.0]-0042:0: Disabled MSI-X.\n[61110.467494] =============================================================================\n[61110.467498] BUG qla2xxx_srbs (Tainted: G OE -------- --- ): Objects remaining in qla2xxx_srbs on __kmem_cache_shutdown()\n[61110.467501] -----------------------------------------------------------------------------\n\n[61110.467502] Slab 0x000000000ffc8162 objects=51 used=1 fp=0x00000000e25d3d85 flags=0x57ffffc0010200(slab|head|node=1|zone=2|lastcpupid=0x1fffff)\n[61110.467509] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G OE -------- --- 5.14.0-284.11.1.el9_2.x86_64 #1\n[61110.467513] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023\n[61110.467515] Call Trace:\n[61110.467516] \u003cTASK\u003e\n[61110.467519] dump_stack_lvl+0x34/0x48\n[61110.467526] slab_err.cold+0x53/0x67\n[61110.467534] __kmem_cache_shutdown+0x16e/0x320\n[61110.467540] kmem_cache_destroy+0x51/0x160\n[61110.467544] qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467607] ? __do_sys_delete_module.constprop.0+0x178/0x280\n[61110.467613] ? syscall_trace_enter.constprop.0+0x145/0x1d0\n[61110.467616] ? do_syscall_64+0x5c/0x90\n[61110.467619] ? exc_page_fault+0x62/0x150\n[61110.467622] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[61110.467626] \u003c/TASK\u003e\n[61110.467627] Disabling lock debugging due to kernel taint\n[61110.467635] Object 0x0000000026f7e6e6 @offset=16000\n[61110.467639] ------------[ cut here ]------------\n[61110.467639] kmem_cache_destroy qla2xxx_srbs: Slab cache still has objects when called from qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467659] WARNING: CPU: 53 PID: 455206 at mm/slab_common.c:520 kmem_cache_destroy+0x14d/0x160\n[61110.467718] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G B OE -------- --- 5.14.0-284.11.1.el9_2.x86_64 #1\n[61110.467720] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023\n[61110.467721] RIP: 0010:kmem_cache_destroy+0x14d/0x160\n[61110.467724] Code: 99 7d 07 00 48 89 ef e8 e1 6a 07 00 eb b3 48 8b 55 60 48 8b 4c 24 20 48 c7 c6 70 fc 66 90 48 c7 c7 f8 ef a1 90 e8 e1 ed 7c 00 \u003c0f\u003e 0b eb 93 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 55 48 89\n[61110.467725] RSP: 0018:ffffa304e489fe80 EFLAGS: 00010282\n[61110.467727] RAX: 0000000000000000 RBX: ffffffffc0d9a860 RCX: 0000000000000027\n[61110.467729] RDX: ffff8fd5ff9598a8 RSI: 0000000000000001 RDI: ffff8fd5ff9598a0\n[61110.467730] RBP: ffff8fb6aaf78700 R08: 0000000000000000 R09: 0000000100d863b7\n[61110.467731] R10: ffffa304e489fd20 R11: ffffffff913bef48 R12: 0000000040002000\n[61110.467731] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[61110.467733] FS: 00007f64c89fb740(0000) GS:ffff8fd5ff940000(0000) knlGS:0000000000000000\n[61110.467734] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[61110.467735] CR2: 00007f0f02bfe000 CR3: 00000020ad6dc005 CR4: 0000000000770ee0\n[61110.467736] PKRU: 55555554\n[61110.467737] Call Trace:\n[61110.467738] \u003cTASK\u003e\n[61110.467739] qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467755] ? __do_sys_delete_module.constprop.0+0x178/0x280\n\nFree sp in the error path to fix the crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71232",
"url": "https://www.suse.com/security/cve/CVE-2025-71232"
},
{
"category": "external",
"summary": "SUSE Bug 1258422 for CVE-2025-71232",
"url": "https://bugzilla.suse.com/1258422"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-71232"
},
{
"cve": "CVE-2025-71233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71233"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: endpoint: Avoid creating sub-groups asynchronously\n\nThe asynchronous creation of sub-groups by a delayed work could lead to a\nNULL pointer dereference when the driver directory is removed before the\nwork completes.\n\nThe crash can be easily reproduced with the following commands:\n\n # cd /sys/kernel/config/pci_ep/functions/pci_epf_test\n # for i in {1..20}; do mkdir test \u0026\u0026 rmdir test; done\n\n BUG: kernel NULL pointer dereference, address: 0000000000000088\n ...\n Call Trace:\n configfs_register_group+0x3d/0x190\n pci_epf_cfs_work+0x41/0x110\n process_one_work+0x18f/0x350\n worker_thread+0x25a/0x3a0\n\nFix this issue by using configfs_add_default_group() API which does not\nhave the deadlock problem as configfs_register_group() and does not require\nthe delayed work handler.\n\n[mani: slightly reworded the description and added stable list]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71233",
"url": "https://www.suse.com/security/cve/CVE-2025-71233"
},
{
"category": "external",
"summary": "SUSE Bug 1258421 for CVE-2025-71233",
"url": "https://bugzilla.suse.com/1258421"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-71233"
},
{
"cve": "CVE-2025-71234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71234"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add\n\nThe driver does not set hw-\u003esta_data_size, which causes mac80211 to\nallocate insufficient space for driver private station data in\n__sta_info_alloc(). When rtl8xxxu_sta_add() accesses members of\nstruct rtl8xxxu_sta_info through sta-\u003edrv_priv, this results in a\nslab-out-of-bounds write.\n\nKASAN report on RISC-V (VisionFive 2) with RTL8192EU adapter:\n\n BUG: KASAN: slab-out-of-bounds in rtl8xxxu_sta_add+0x31c/0x346\n Write of size 8 at addr ffffffd6d3e9ae88 by task kworker/u16:0/12\n\nSet hw-\u003esta_data_size to sizeof(struct rtl8xxxu_sta_info) during\nprobe, similar to how hw-\u003evif_data_size is configured. This ensures\nmac80211 allocates sufficient space for the driver\u0027s per-station\nprivate data.\n\nTested on StarFive VisionFive 2 v1.2A board.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71234",
"url": "https://www.suse.com/security/cve/CVE-2025-71234"
},
{
"category": "external",
"summary": "SUSE Bug 1258419 for CVE-2025-71234",
"url": "https://bugzilla.suse.com/1258419"
},
{
"category": "external",
"summary": "SUSE Bug 1258420 for CVE-2025-71234",
"url": "https://bugzilla.suse.com/1258420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-71234"
},
{
"cve": "CVE-2025-71235",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71235"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Delay module unload while fabric scan in progress\n\nSystem crash seen during load/unload test in a loop.\n\n[105954.384919] RBP: ffff914589838dc0 R08: 0000000000000000 R09: 0000000000000086\n[105954.384920] R10: 000000000000000f R11: ffffa31240904be5 R12: ffff914605f868e0\n[105954.384921] R13: ffff914605f86910 R14: 0000000000008010 R15: 00000000ddb7c000\n[105954.384923] FS: 0000000000000000(0000) GS:ffff9163fec40000(0000) knlGS:0000000000000000\n[105954.384925] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[105954.384926] CR2: 000055d31ce1d6a0 CR3: 0000000119f5e001 CR4: 0000000000770ee0\n[105954.384928] PKRU: 55555554\n[105954.384929] Call Trace:\n[105954.384931] \u003cIRQ\u003e\n[105954.384934] qla24xx_sp_unmap+0x1f3/0x2a0 [qla2xxx]\n[105954.384962] ? qla_async_scan_sp_done+0x114/0x1f0 [qla2xxx]\n[105954.384980] ? qla24xx_els_ct_entry+0x4de/0x760 [qla2xxx]\n[105954.384999] ? __wake_up_common+0x80/0x190\n[105954.385004] ? qla24xx_process_response_queue+0xc2/0xaa0 [qla2xxx]\n[105954.385023] ? qla24xx_msix_rsp_q+0x44/0xb0 [qla2xxx]\n[105954.385040] ? __handle_irq_event_percpu+0x3d/0x190\n[105954.385044] ? handle_irq_event+0x58/0xb0\n[105954.385046] ? handle_edge_irq+0x93/0x240\n[105954.385050] ? __common_interrupt+0x41/0xa0\n[105954.385055] ? common_interrupt+0x3e/0xa0\n[105954.385060] ? asm_common_interrupt+0x22/0x40\n\nThe root cause of this was that there was a free (dma_free_attrs) in the\ninterrupt context. There was a device discovery/fabric scan in\nprogress. A module unload was issued which set the UNLOADING flag. As\npart of the discovery, after receiving an interrupt a work queue was\nscheduled (which involved a work to be queued). Since the UNLOADING\nflag is set, the work item was not allocated and the mapped memory had\nto be freed. The free occurred in interrupt context leading to system\ncrash. Delay the driver unload until the fabric scan is complete to\navoid the crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71235",
"url": "https://www.suse.com/security/cve/CVE-2025-71235"
},
{
"category": "external",
"summary": "SUSE Bug 1258469 for CVE-2025-71235",
"url": "https://bugzilla.suse.com/1258469"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-71235"
},
{
"cve": "CVE-2025-71236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71236"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Validate sp before freeing associated memory\n\nSystem crash with the following signature\n[154563.214890] nvme nvme2: NVME-FC{1}: controller connect complete\n[154564.169363] qla2xxx [0000:b0:00.1]-3002:2: nvme: Sched: Set ZIO exchange threshold to 3.\n[154564.169405] qla2xxx [0000:b0:00.1]-ffffff:2: SET ZIO Activity exchange threshold to 5.\n[154565.539974] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed - 0078 0080 0000.\n[154565.545744] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed - 0078 00a0 0000.\n[154565.545857] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).\n[154565.552760] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).\n[154565.553079] BUG: kernel NULL pointer dereference, address: 00000000000000f8\n[154565.553080] #PF: supervisor read access in kernel mode\n[154565.553082] #PF: error_code(0x0000) - not-present page\n[154565.553084] PGD 80000010488ab067 P4D 80000010488ab067 PUD 104978a067 PMD 0\n[154565.553089] Oops: 0000 1 PREEMPT SMP PTI\n[154565.553092] CPU: 10 PID: 858 Comm: qla2xxx_2_dpc Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.11.1.el9_5.x86_64 #1\n[154565.553096] Hardware name: HPE Synergy 660 Gen10/Synergy 660 Gen10 Compute Module, BIOS I43 09/30/2024\n[154565.553097] RIP: 0010:qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]\n[154565.553141] Code: 00 00 e8 58 a3 ec d4 49 89 e9 ba 12 20 00 00 4c 89 e6 49 c7 c0 00 ee a8 c0 48 c7 c1 66 c0 a9 c0 bf 00 80 00 10 e8 15 69 00 00 \u003c4c\u003e 8b 8d f8 00 00 00 4d 85 c9 74 35 49 8b 84 24 00 19 00 00 48 8b\n[154565.553143] RSP: 0018:ffffb4dbc8aebdd0 EFLAGS: 00010286\n[154565.553145] RAX: 0000000000000000 RBX: ffff8ec2cf0908d0 RCX: 0000000000000002\n[154565.553147] RDX: 0000000000000000 RSI: ffffffffc0a9c896 RDI: ffffb4dbc8aebd47\n[154565.553148] RBP: 0000000000000000 R08: ffffb4dbc8aebd45 R09: 0000000000ffff0a\n[154565.553150] R10: 0000000000000000 R11: 000000000000000f R12: ffff8ec2cf0908d0\n[154565.553151] R13: ffff8ec2cf090900 R14: 0000000000000102 R15: ffff8ec2cf084000\n[154565.553152] FS: 0000000000000000(0000) GS:ffff8ed27f800000(0000) knlGS:0000000000000000\n[154565.553154] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[154565.553155] CR2: 00000000000000f8 CR3: 000000113ae0a005 CR4: 00000000007706f0\n[154565.553157] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[154565.553158] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[154565.553159] PKRU: 55555554\n[154565.553160] Call Trace:\n[154565.553162] \u003cTASK\u003e\n[154565.553165] ? show_trace_log_lvl+0x1c4/0x2df\n[154565.553172] ? show_trace_log_lvl+0x1c4/0x2df\n[154565.553177] ? qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]\n[154565.553215] ? __die_body.cold+0x8/0xd\n[154565.553218] ? page_fault_oops+0x134/0x170\n[154565.553223] ? snprintf+0x49/0x70\n[154565.553229] ? exc_page_fault+0x62/0x150\n[154565.553238] ? asm_exc_page_fault+0x22/0x30\n\nCheck for sp being non NULL before freeing any associated memory",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71236",
"url": "https://www.suse.com/security/cve/CVE-2025-71236"
},
{
"category": "external",
"summary": "SUSE Bug 1258442 for CVE-2025-71236",
"url": "https://bugzilla.suse.com/1258442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-71236"
},
{
"cve": "CVE-2025-71237",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71237"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: Fix potential block overflow that cause system hang\n\nWhen a user executes the FITRIM command, an underflow can occur when\ncalculating nblocks if end_block is too small. Since nblocks is of\ntype sector_t, which is u64, a negative nblocks value will become a\nvery large positive integer. This ultimately leads to the block layer\nfunction __blkdev_issue_discard() taking an excessively long time to\nprocess the bio chain, and the ns_segctor_sem lock remains held for a\nlong period. This prevents other tasks from acquiring the ns_segctor_sem\nlock, resulting in the hang reported by syzbot in [1].\n\nIf the ending block is too small, typically if it is smaller than 4KiB\nrange, depending on the usage of the segment 0, it may be possible to\nattempt a discard request beyond the device size causing the hang.\n\nExiting successfully and assign the discarded size (0 in this case)\nto range-\u003elen.\n\nAlthough the start and len values in the user input range are too small,\na conservative strategy is adopted here to safely ignore them, which is\nequivalent to a no-op; it will not perform any trimming and will not\nthrow an error.\n\n[1]\ntask:segctord state:D stack:28968 pid:6093 tgid:6093 ppid:2 task_flags:0x200040 flags:0x00080000\nCall Trace:\n rwbase_write_lock+0x3dd/0x750 kernel/locking/rwbase_rt.c:272\n nilfs_transaction_lock+0x253/0x4c0 fs/nilfs2/segment.c:357\n nilfs_segctor_thread_construct fs/nilfs2/segment.c:2569 [inline]\n nilfs_segctor_thread+0x6ec/0xe00 fs/nilfs2/segment.c:2684\n\n[ryusuke: corrected part of the commit message about the consequences]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71237",
"url": "https://www.suse.com/security/cve/CVE-2025-71237"
},
{
"category": "external",
"summary": "SUSE Bug 1258467 for CVE-2025-71237",
"url": "https://bugzilla.suse.com/1258467"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-71237"
},
{
"cve": "CVE-2025-71238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71238"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix bsg_done() causing double free\n\nKernel panic observed on system,\n\n[5353358.825191] BUG: unable to handle page fault for address: ff5f5e897b024000\n[5353358.825194] #PF: supervisor write access in kernel mode\n[5353358.825195] #PF: error_code(0x0002) - not-present page\n[5353358.825196] PGD 100006067 P4D 0\n[5353358.825198] Oops: 0002 [#1] PREEMPT SMP NOPTI\n[5353358.825200] CPU: 5 PID: 2132085 Comm: qlafwupdate.sub Kdump: loaded Tainted: G W L ------- --- 5.14.0-503.34.1.el9_5.x86_64 #1\n[5353358.825203] Hardware name: HPE ProLiant DL360 Gen11/ProLiant DL360 Gen11, BIOS 2.44 01/17/2025\n[5353358.825204] RIP: 0010:memcpy_erms+0x6/0x10\n[5353358.825211] RSP: 0018:ff591da8f4f6b710 EFLAGS: 00010246\n[5353358.825212] RAX: ff5f5e897b024000 RBX: 0000000000007090 RCX: 0000000000001000\n[5353358.825213] RDX: 0000000000001000 RSI: ff591da8f4fed090 RDI: ff5f5e897b024000\n[5353358.825214] RBP: 0000000000010000 R08: ff5f5e897b024000 R09: 0000000000000000\n[5353358.825215] R10: ff46cf8c40517000 R11: 0000000000000001 R12: 0000000000008090\n[5353358.825216] R13: ff591da8f4f6b720 R14: 0000000000001000 R15: 0000000000000000\n[5353358.825218] FS: 00007f1e88d47740(0000) GS:ff46cf935f940000(0000) knlGS:0000000000000000\n[5353358.825219] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[5353358.825220] CR2: ff5f5e897b024000 CR3: 0000000231532004 CR4: 0000000000771ef0\n[5353358.825221] PKRU: 55555554\n[5353358.825222] Call Trace:\n[5353358.825223] \u003cTASK\u003e\n[5353358.825224] ? show_trace_log_lvl+0x1c4/0x2df\n[5353358.825229] ? show_trace_log_lvl+0x1c4/0x2df\n[5353358.825232] ? sg_copy_buffer+0xc8/0x110\n[5353358.825236] ? __die_body.cold+0x8/0xd\n[5353358.825238] ? page_fault_oops+0x134/0x170\n[5353358.825242] ? kernelmode_fixup_or_oops+0x84/0x110\n[5353358.825244] ? exc_page_fault+0xa8/0x150\n[5353358.825247] ? asm_exc_page_fault+0x22/0x30\n[5353358.825252] ? memcpy_erms+0x6/0x10\n[5353358.825253] sg_copy_buffer+0xc8/0x110\n[5353358.825259] qla2x00_process_vendor_specific+0x652/0x1320 [qla2xxx]\n[5353358.825317] qla24xx_bsg_request+0x1b2/0x2d0 [qla2xxx]\n\nMost routines in qla_bsg.c call bsg_done() only for success cases.\nHowever a few invoke it for failure case as well leading to a double\nfree. Validate before calling bsg_done().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71238",
"url": "https://www.suse.com/security/cve/CVE-2025-71238"
},
{
"category": "external",
"summary": "SUSE Bug 1259186 for CVE-2025-71238",
"url": "https://bugzilla.suse.com/1259186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-71238"
},
{
"cve": "CVE-2026-23220",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23220"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths\n\nThe problem occurs when a signed request fails smb2 signature verification\ncheck. In __process_request(), if check_sign_req() returns an error,\nset_smb2_rsp_status(work, STATUS_ACCESS_DENIED) is called.\nset_smb2_rsp_status() set work-\u003enext_smb2_rcv_hdr_off as zero. By resetting\nnext_smb2_rcv_hdr_off to zero, the pointer to the next command in the chain\nis lost. Consequently, is_chained_smb2_message() continues to point to\nthe same request header instead of advancing. If the header\u0027s NextCommand\nfield is non-zero, the function returns true, causing __handle_ksmbd_work()\nto repeatedly process the same failed request in an infinite loop.\nThis results in the kernel log being flooded with \"bad smb2 signature\"\nmessages and high CPU usage.\n\nThis patch fixes the issue by changing the return value from\nSERVER_HANDLER_CONTINUE to SERVER_HANDLER_ABORT. This ensures that\nthe processing loop terminates immediately rather than attempting to\ncontinue from an invalidated offset.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23220",
"url": "https://www.suse.com/security/cve/CVE-2026-23220"
},
{
"category": "external",
"summary": "SUSE Bug 1258432 for CVE-2026-23220",
"url": "https://bugzilla.suse.com/1258432"
},
{
"category": "external",
"summary": "SUSE Bug 1258433 for CVE-2026-23220",
"url": "https://bugzilla.suse.com/1258433"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-23220"
},
{
"cve": "CVE-2026-23221",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23221"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: fsl-mc: fix use-after-free in driver_override_show()\n\nThe driver_override_show() function reads the driver_override string\nwithout holding the device_lock. However, driver_override_store() uses\ndriver_set_override(), which modifies and frees the string while holding\nthe device_lock.\n\nThis can result in a concurrent use-after-free if the string is freed\nby the store function while being read by the show function.\n\nFix this by holding the device_lock around the read operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23221",
"url": "https://www.suse.com/security/cve/CVE-2026-23221"
},
{
"category": "external",
"summary": "SUSE Bug 1258660 for CVE-2026-23221",
"url": "https://bugzilla.suse.com/1258660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23221"
},
{
"cve": "CVE-2026-23222",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23222"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly\n\nThe existing allocation of scatterlists in omap_crypto_copy_sg_lists()\nwas allocating an array of scatterlist pointers, not scatterlist objects,\nresulting in a 4x too small allocation.\n\nUse sizeof(*new_sg) to get the correct object size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23222",
"url": "https://www.suse.com/security/cve/CVE-2026-23222"
},
{
"category": "external",
"summary": "SUSE Bug 1258484 for CVE-2026-23222",
"url": "https://bugzilla.suse.com/1258484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23222"
},
{
"cve": "CVE-2026-23223",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23223"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: fix UAF in xchk_btree_check_block_owner\n\nWe cannot dereference bs-\u003ecur when trying to determine if bs-\u003ecur\naliases bs-\u003esc-\u003esa.{bno,rmap}_cur after the latter has been freed.\nFix this by sampling before type before any freeing could happen.\nThe correct temporal ordering was broken when we removed xfs_btnum_t.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23223",
"url": "https://www.suse.com/security/cve/CVE-2026-23223"
},
{
"category": "external",
"summary": "SUSE Bug 1258483 for CVE-2026-23223",
"url": "https://bugzilla.suse.com/1258483"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23223"
},
{
"cve": "CVE-2026-23224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23224"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: fix UAF issue for file-backed mounts w/ directio option\n\n[ 9.269940][ T3222] Call trace:\n[ 9.269948][ T3222] ext4_file_read_iter+0xac/0x108\n[ 9.269979][ T3222] vfs_iocb_iter_read+0xac/0x198\n[ 9.269993][ T3222] erofs_fileio_rq_submit+0x12c/0x180\n[ 9.270008][ T3222] erofs_fileio_submit_bio+0x14/0x24\n[ 9.270030][ T3222] z_erofs_runqueue+0x834/0x8ac\n[ 9.270054][ T3222] z_erofs_read_folio+0x120/0x220\n[ 9.270083][ T3222] filemap_read_folio+0x60/0x120\n[ 9.270102][ T3222] filemap_fault+0xcac/0x1060\n[ 9.270119][ T3222] do_pte_missing+0x2d8/0x1554\n[ 9.270131][ T3222] handle_mm_fault+0x5ec/0x70c\n[ 9.270142][ T3222] do_page_fault+0x178/0x88c\n[ 9.270167][ T3222] do_translation_fault+0x38/0x54\n[ 9.270183][ T3222] do_mem_abort+0x54/0xac\n[ 9.270208][ T3222] el0_da+0x44/0x7c\n[ 9.270227][ T3222] el0t_64_sync_handler+0x5c/0xf4\n[ 9.270253][ T3222] el0t_64_sync+0x1bc/0x1c0\n\nEROFS may encounter above panic when enabling file-backed mount w/\ndirectio mount option, the root cause is it may suffer UAF in below\nrace condition:\n\n- z_erofs_read_folio wq s_dio_done_wq\n - z_erofs_runqueue\n - erofs_fileio_submit_bio\n - erofs_fileio_rq_submit\n - vfs_iocb_iter_read\n - ext4_file_read_iter\n - ext4_dio_read_iter\n - iomap_dio_rw\n : bio was submitted and return -EIOCBQUEUED\n - dio_aio_complete_work\n - dio_complete\n - dio-\u003eiocb-\u003eki_complete (erofs_fileio_ki_complete())\n - kfree(rq)\n : it frees iocb, iocb.ki_filp can be UAF in file_accessed().\n - file_accessed\n : access NULL file point\n\nIntroduce a reference count in struct erofs_fileio_rq, and initialize it\nas two, both erofs_fileio_ki_complete() and erofs_fileio_rq_submit() will\ndecrease reference count, the last one decreasing the reference count\nto zero will free rq.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23224",
"url": "https://www.suse.com/security/cve/CVE-2026-23224"
},
{
"category": "external",
"summary": "SUSE Bug 1258461 for CVE-2026-23224",
"url": "https://bugzilla.suse.com/1258461"
},
{
"category": "external",
"summary": "SUSE Bug 1258463 for CVE-2026-23224",
"url": "https://bugzilla.suse.com/1258463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-23224"
},
{
"cve": "CVE-2026-23225",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23225"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/mmcid: Don\u0027t assume CID is CPU owned on mode switch\n\nShinichiro reported a KASAN UAF, which is actually an out of bounds access\nin the MMCID management code.\n\n CPU0\t\t\t\t\t\tCPU1\n \t\t\t\t\t\tT1 runs in userspace\n T0: fork(T4) -\u003e Switch to per CPU CID mode\n fixup() set MM_CID_TRANSIT on T1/CPU1\n T4 exit()\n T3 exit()\n T2 exit()\n\t\t\t\t\t\tT1 exit() switch to per task mode\n\t\t\t\t\t\t ---\u003e Out of bounds access.\n\nAs T1 has not scheduled after T0 set the TRANSIT bit, it exits with the\nTRANSIT bit set. sched_mm_cid_remove_user() clears the TRANSIT bit in\nthe task and drops the CID, but it does not touch the per CPU storage.\nThat\u0027s functionally correct because a CID is only owned by the CPU when\nthe ONCPU bit is set, which is mutually exclusive with the TRANSIT flag.\n\nNow sched_mm_cid_exit() assumes that the CID is CPU owned because the\nprior mode was per CPU. It invokes mm_drop_cid_on_cpu() which clears the\nnot set ONCPU bit and then invokes clear_bit() with an insanely large\nbit number because TRANSIT is set (bit 29).\n\nPrevent that by actually validating that the CID is CPU owned in\nmm_drop_cid_on_cpu().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23225",
"url": "https://www.suse.com/security/cve/CVE-2026-23225"
},
{
"category": "external",
"summary": "SUSE Bug 1258474 for CVE-2026-23225",
"url": "https://bugzilla.suse.com/1258474"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23225"
},
{
"cve": "CVE-2026-23226",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23226"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: add chann_lock to protect ksmbd_chann_list xarray\n\nksmbd_chann_list xarray lacks synchronization, allowing use-after-free in\nmulti-channel sessions (between lookup_chann_list() and ksmbd_chann_del).\n\nAdds rw_semaphore chann_lock to struct ksmbd_session and protects\nall xa_load/xa_store/xa_erase accesses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23226",
"url": "https://www.suse.com/security/cve/CVE-2026-23226"
},
{
"category": "external",
"summary": "SUSE Bug 1258820 for CVE-2026-23226",
"url": "https://bugzilla.suse.com/1258820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23226"
},
{
"cve": "CVE-2026-23227",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23227"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/exynos: vidi: use ctx-\u003elock to protect struct vidi_context member variables related to memory alloc/free\n\nExynos Virtual Display driver performs memory alloc/free operations\nwithout lock protection, which easily causes concurrency problem.\n\nFor example, use-after-free can occur in race scenario like this:\n```\n\tCPU0\t\t\t\tCPU1\t\t\t\tCPU2\n\t----\t\t\t\t----\t\t\t\t----\n vidi_connection_ioctl()\n if (vidi-\u003econnection) // true\n drm_edid = drm_edid_alloc(); // alloc drm_edid\n ...\n ctx-\u003eraw_edid = drm_edid;\n ...\n\t\t\t\t\t\t\t\tdrm_mode_getconnector()\n\t\t\t\t\t\t\t\t drm_helper_probe_single_connector_modes()\n\t\t\t\t\t\t\t\t vidi_get_modes()\n\t\t\t\t\t\t\t\t if (ctx-\u003eraw_edid) // true\n\t\t\t\t\t\t\t\t drm_edid_dup(ctx-\u003eraw_edid);\n\t\t\t\t\t\t\t\t if (!drm_edid) // false\n\t\t\t\t\t\t\t\t ...\n\t\t\t\tvidi_connection_ioctl()\n\t\t\t\t if (vidi-\u003econnection) // false\n\t\t\t\t drm_edid_free(ctx-\u003eraw_edid); // free drm_edid\n\t\t\t\t ...\n\t\t\t\t\t\t\t\t drm_edid_alloc(drm_edid-\u003eedid)\n\t\t\t\t\t\t\t\t kmemdup(edid); // UAF!!\n\t\t\t\t\t\t\t\t ...\n```\n\nTo prevent these vulns, at least in vidi_context, member variables related\nto memory alloc/free should be protected with ctx-\u003elock.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23227",
"url": "https://www.suse.com/security/cve/CVE-2026-23227"
},
{
"category": "external",
"summary": "SUSE Bug 1258472 for CVE-2026-23227",
"url": "https://bugzilla.suse.com/1258472"
},
{
"category": "external",
"summary": "SUSE Bug 1258473 for CVE-2026-23227",
"url": "https://bugzilla.suse.com/1258473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-23227"
},
{
"cve": "CVE-2026-23228",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23228"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection()\n\nOn kthread_run() failure in ksmbd_tcp_new_connection(), the transport is\nfreed via free_transport(), which does not decrement active_num_conn,\nleaking this counter.\n\nReplace free_transport() with ksmbd_tcp_disconnect().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23228",
"url": "https://www.suse.com/security/cve/CVE-2026-23228"
},
{
"category": "external",
"summary": "SUSE Bug 1258431 for CVE-2026-23228",
"url": "https://bugzilla.suse.com/1258431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23228"
},
{
"cve": "CVE-2026-23229",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23229"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: virtio - Add spinlock protection with virtqueue notification\n\nWhen VM boots with one virtio-crypto PCI device and builtin backend,\nrun openssl benchmark command with multiple processes, such as\n openssl speed -evp aes-128-cbc -engine afalg -seconds 10 -multi 32\n\nopenssl processes will hangup and there is error reported like this:\n virtio_crypto virtio0: dataq.0:id 3 is not a head!\n\nIt seems that the data virtqueue need protection when it is handled\nfor virtio done notification. If the spinlock protection is added\nin virtcrypto_done_task(), openssl benchmark with multiple processes\nworks well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23229",
"url": "https://www.suse.com/security/cve/CVE-2026-23229"
},
{
"category": "external",
"summary": "SUSE Bug 1258429 for CVE-2026-23229",
"url": "https://bugzilla.suse.com/1258429"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23229"
},
{
"cve": "CVE-2026-23230",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23230"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: split cached_fid bitfields to avoid shared-byte RMW races\n\nis_open, has_lease and on_list are stored in the same bitfield byte in\nstruct cached_fid but are updated in different code paths that may run\nconcurrently. Bitfield assignments generate byte read-modify-write\noperations (e.g. `orb $mask, addr` on x86_64), so updating one flag can\nrestore stale values of the others.\n\nA possible interleaving is:\n CPU1: load old byte (has_lease=1, on_list=1)\n CPU2: clear both flags (store 0)\n CPU1: RMW store (old | IS_OPEN) -\u003e reintroduces cleared bits\n\nTo avoid this class of races, convert these flags to separate bool\nfields.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23230",
"url": "https://www.suse.com/security/cve/CVE-2026-23230"
},
{
"category": "external",
"summary": "SUSE Bug 1258430 for CVE-2026-23230",
"url": "https://bugzilla.suse.com/1258430"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23230"
},
{
"cve": "CVE-2026-23231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23231"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix use-after-free in nf_tables_addchain()\n\nnf_tables_addchain() publishes the chain to table-\u003echains via\nlist_add_tail_rcu() (in nft_chain_add()) before registering hooks.\nIf nf_tables_register_hook() then fails, the error path calls\nnft_chain_del() (list_del_rcu()) followed by nf_tables_chain_destroy()\nwith no RCU grace period in between.\n\nThis creates two use-after-free conditions:\n\n 1) Control-plane: nf_tables_dump_chains() traverses table-\u003echains\n under rcu_read_lock(). A concurrent dump can still be walking\n the chain when the error path frees it.\n\n 2) Packet path: for NFPROTO_INET, nf_register_net_hook() briefly\n installs the IPv4 hook before IPv6 registration fails. Packets\n entering nft_do_chain() via the transient IPv4 hook can still be\n dereferencing chain-\u003eblob_gen_X when the error path frees the\n chain.\n\nAdd synchronize_rcu() between nft_chain_del() and the chain destroy\nso that all RCU readers -- both dump threads and in-flight packet\nevaluation -- have finished before the chain is freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23231",
"url": "https://www.suse.com/security/cve/CVE-2026-23231"
},
{
"category": "external",
"summary": "SUSE Bug 1259188 for CVE-2026-23231",
"url": "https://bugzilla.suse.com/1259188"
},
{
"category": "external",
"summary": "SUSE Bug 1259189 for CVE-2026-23231",
"url": "https://bugzilla.suse.com/1259189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-23231"
},
{
"cve": "CVE-2026-23232",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23232"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"f2fs: block cache/dio write during f2fs_enable_checkpoint()\"\n\nThis reverts commit 196c81fdd438f7ac429d5639090a9816abb9760a.\n\nOriginal patch may cause below deadlock, revert it.\n\nwrite\t\t\t\tremount\n- write_begin\n - lock_page --- lock A\n - prepare_write_begin\n - f2fs_map_lock\n\t\t\t\t- f2fs_enable_checkpoint\n\t\t\t\t - down_write(cp_enable_rwsem) --- lock B\n\t\t\t\t - sync_inode_sb\n\t\t\t\t - writepages\n\t\t\t\t - lock_page\t\t\t--- lock A\n - down_read(cp_enable_rwsem) --- lock A",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23232",
"url": "https://www.suse.com/security/cve/CVE-2026-23232"
},
{
"category": "external",
"summary": "SUSE Bug 1259192 for CVE-2026-23232",
"url": "https://bugzilla.suse.com/1259192"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23232"
},
{
"cve": "CVE-2026-23233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23233"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid mapping wrong physical block for swapfile\n\nXiaolong Guo reported a f2fs bug in bugzilla [1]\n\n[1] https://bugzilla.kernel.org/show_bug.cgi?id=220951\n\nQuoted:\n\n\"When using stress-ng\u0027s swap stress test on F2FS filesystem with kernel 6.6+,\nthe system experiences data corruption leading to either:\n1 dm-verity corruption errors and device reboot\n2 F2FS node corruption errors and boot hangs\n\nThe issue occurs specifically when:\n1 Using F2FS filesystem (ext4 is unaffected)\n2 Swapfile size is less than F2FS section size (2MB)\n3 Swapfile has fragmented physical layout (multiple non-contiguous extents)\n4 Kernel version is 6.6+ (6.1 is unaffected)\n\nThe root cause is in check_swap_activate() function in fs/f2fs/data.c. When the\nfirst extent of a small swapfile (\u003c 2MB) is not aligned to section boundaries,\nthe function incorrectly treats it as the last extent, failing to map\nsubsequent extents. This results in incorrect swap_extent creation where only\nthe first extent is mapped, causing subsequent swap writes to overwrite wrong\nphysical locations (other files\u0027 data).\n\nSteps to Reproduce\n1 Setup a device with F2FS-formatted userdata partition\n2 Compile stress-ng from https://github.com/ColinIanKing/stress-ng\n3 Run swap stress test: (Android devices)\nadb shell \"cd /data/stressng; ./stress-ng-64 --metrics-brief --timeout 60\n--swap 0\"\n\nLog:\n1 Ftrace shows in kernel 6.6, only first extent is mapped during second\nf2fs_map_blocks call in check_swap_activate():\nstress-ng-swap-8990: f2fs_map_blocks: ino=11002, file offset=0, start\nblkaddr=0x43143, len=0x1\n(Only 4KB mapped, not the full swapfile)\n2 in kernel 6.1, both extents are correctly mapped:\nstress-ng-swap-5966: f2fs_map_blocks: ino=28011, file offset=0, start\nblkaddr=0x13cd4, len=0x1\nstress-ng-swap-5966: f2fs_map_blocks: ino=28011, file offset=1, start\nblkaddr=0x60c84b, len=0xff\n\nThe problematic code is in check_swap_activate():\nif ((pblock - SM_I(sbi)-\u003emain_blkaddr) % blks_per_sec ||\n nr_pblocks % blks_per_sec ||\n !f2fs_valid_pinned_area(sbi, pblock)) {\n bool last_extent = false;\n\n not_aligned++;\n\n nr_pblocks = roundup(nr_pblocks, blks_per_sec);\n if (cur_lblock + nr_pblocks \u003e sis-\u003emax)\n nr_pblocks -= blks_per_sec;\n\n /* this extent is last one */\n if (!nr_pblocks) {\n nr_pblocks = last_lblock - cur_lblock;\n last_extent = true;\n }\n\n ret = f2fs_migrate_blocks(inode, cur_lblock, nr_pblocks);\n if (ret) {\n if (ret == -ENOENT)\n ret = -EINVAL;\n goto out;\n }\n\n if (!last_extent)\n goto retry;\n}\n\nWhen the first extent is unaligned and roundup(nr_pblocks, blks_per_sec)\nexceeds sis-\u003emax, we subtract blks_per_sec resulting in nr_pblocks = 0. The\ncode then incorrectly assumes this is the last extent, sets nr_pblocks =\nlast_lblock - cur_lblock (entire swapfile), and performs migration. After\nmigration, it doesn\u0027t retry mapping, so subsequent extents are never processed.\n\"\n\nIn order to fix this issue, we need to lookup block mapping info after\nwe migrate all blocks in the tail of swapfile.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23233",
"url": "https://www.suse.com/security/cve/CVE-2026-23233"
},
{
"category": "external",
"summary": "SUSE Bug 1259193 for CVE-2026-23233",
"url": "https://bugzilla.suse.com/1259193"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-23233"
},
{
"cve": "CVE-2026-23234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23234"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid UAF in f2fs_write_end_io()\n\nAs syzbot reported an use-after-free issue in f2fs_write_end_io().\n\nIt is caused by below race condition:\n\nloop device\t\t\t\tumount\n- worker_thread\n - loop_process_work\n - do_req_filebacked\n - lo_rw_aio\n - lo_rw_aio_complete\n - blk_mq_end_request\n - blk_update_request\n - f2fs_write_end_io\n - dec_page_count\n - folio_end_writeback\n\t\t\t\t\t- kill_f2fs_super\n\t\t\t\t\t - kill_block_super\n\t\t\t\t\t - f2fs_put_super\n\t\t\t\t\t : free(sbi)\n : get_pages(, F2FS_WB_CP_DATA)\n accessed sbi which is freed\n\nIn kill_f2fs_super(), we will drop all page caches of f2fs inodes before\ncall free(sbi), it guarantee that all folios should end its writeback, so\nit should be safe to access sbi before last folio_end_writeback().\n\nLet\u0027s relocate ckpt thread wakeup flow before folio_end_writeback() to\nresolve this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23234",
"url": "https://www.suse.com/security/cve/CVE-2026-23234"
},
{
"category": "external",
"summary": "SUSE Bug 1259194 for CVE-2026-23234",
"url": "https://bugzilla.suse.com/1259194"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-23234"
},
{
"cve": "CVE-2026-23235",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23235"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix out-of-bounds access in sysfs attribute read/write\n\nSome f2fs sysfs attributes suffer from out-of-bounds memory access and\nincorrect handling of integer values whose size is not 4 bytes.\n\nFor example:\nvm:~# echo 65537 \u003e /sys/fs/f2fs/vde/carve_out\nvm:~# cat /sys/fs/f2fs/vde/carve_out\n65537\nvm:~# echo 4294967297 \u003e /sys/fs/f2fs/vde/atgc_age_threshold\nvm:~# cat /sys/fs/f2fs/vde/atgc_age_threshold\n1\n\ncarve_out maps to {struct f2fs_sb_info}-\u003ecarve_out, which is a 8-bit\ninteger. However, the sysfs interface allows setting it to a value\nlarger than 255, resulting in an out-of-range update.\n\natgc_age_threshold maps to {struct atgc_management}-\u003eage_threshold,\nwhich is a 64-bit integer, but its sysfs interface cannot correctly set\nvalues larger than UINT_MAX.\n\nThe root causes are:\n1. __sbi_store() treats all default values as unsigned int, which\nprevents updating integers larger than 4 bytes and causes out-of-bounds\nwrites for integers smaller than 4 bytes.\n\n2. f2fs_sbi_show() also assumes all default values are unsigned int,\nleading to out-of-bounds reads and incorrect access to integers larger\nthan 4 bytes.\n\nThis patch introduces {struct f2fs_attr}-\u003esize to record the actual size\nof the integer associated with each sysfs attribute. With this\ninformation, sysfs read and write operations can correctly access and\nupdate values according to their real data size, avoiding memory\ncorruption and truncation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23235",
"url": "https://www.suse.com/security/cve/CVE-2026-23235"
},
{
"category": "external",
"summary": "SUSE Bug 1259195 for CVE-2026-23235",
"url": "https://bugzilla.suse.com/1259195"
},
{
"category": "external",
"summary": "SUSE Bug 1259198 for CVE-2026-23235",
"url": "https://bugzilla.suse.com/1259198"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-23235"
},
{
"cve": "CVE-2026-23236",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23236"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: smscufx: properly copy ioctl memory to kernelspace\n\nThe UFX_IOCTL_REPORT_DAMAGE ioctl does not properly copy data from\nuserspace to kernelspace, and instead directly references the memory,\nwhich can cause problems if invalid data is passed from userspace. Fix\nthis all up by correctly copying the memory before accessing it within\nthe kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23236",
"url": "https://www.suse.com/security/cve/CVE-2026-23236"
},
{
"category": "external",
"summary": "SUSE Bug 1259199 for CVE-2026-23236",
"url": "https://bugzilla.suse.com/1259199"
},
{
"category": "external",
"summary": "SUSE Bug 1259200 for CVE-2026-23236",
"url": "https://bugzilla.suse.com/1259200"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-23236"
},
{
"cve": "CVE-2026-23239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23239"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nespintcp: Fix race condition in espintcp_close()\n\nThis issue was discovered during a code audit.\n\nAfter cancel_work_sync() is called from espintcp_close(),\nespintcp_tx_work() can still be scheduled from paths such as\nthe Delayed ACK handler or ksoftirqd.\nAs a result, the espintcp_tx_work() worker may dereference a\nfreed espintcp ctx or sk.\n\nThe following is a simple race scenario:\n\n cpu0 cpu1\n\n espintcp_close()\n cancel_work_sync(\u0026ctx-\u003ework);\n espintcp_write_space()\n schedule_work(\u0026ctx-\u003ework);\n\nTo prevent this race condition, cancel_work_sync() is\nreplaced with disable_work_sync().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23239",
"url": "https://www.suse.com/security/cve/CVE-2026-23239"
},
{
"category": "external",
"summary": "SUSE Bug 1259485 for CVE-2026-23239",
"url": "https://bugzilla.suse.com/1259485"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23239"
},
{
"cve": "CVE-2026-23240",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23240"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Fix race condition in tls_sw_cancel_work_tx()\n\nThis issue was discovered during a code audit.\n\nAfter cancel_delayed_work_sync() is called from tls_sk_proto_close(),\ntx_work_handler() can still be scheduled from paths such as the\nDelayed ACK handler or ksoftirqd.\nAs a result, the tx_work_handler() worker may dereference a freed\nTLS object.\n\nThe following is a simple race scenario:\n\n cpu0 cpu1\n\ntls_sk_proto_close()\n tls_sw_cancel_work_tx()\n tls_write_space()\n tls_sw_write_space()\n if (!test_and_set_bit(BIT_TX_SCHEDULED, \u0026tx_ctx-\u003etx_bitmask))\n set_bit(BIT_TX_SCHEDULED, \u0026ctx-\u003etx_bitmask);\n cancel_delayed_work_sync(\u0026ctx-\u003etx_work.work);\n schedule_delayed_work(\u0026tx_ctx-\u003etx_work.work, 0);\n\nTo prevent this race condition, cancel_delayed_work_sync() is\nreplaced with disable_delayed_work_sync().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23240",
"url": "https://www.suse.com/security/cve/CVE-2026-23240"
},
{
"category": "external",
"summary": "SUSE Bug 1259484 for CVE-2026-23240",
"url": "https://bugzilla.suse.com/1259484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-6.19.8-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-6.19.8-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-23240"
}
]
}
SUSE-SU-2026:21237-1
Vulnerability from csaf_suse - Published: 2026-04-20 15:44 - Updated: 2026-04-20 15:44| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2025-39998: scsi: target: target_core_configfs: Add length check to avoid buffer overflow (bsc#1252073).\n- CVE-2025-40253: s390/ctcm: Fix double-kfree (bsc#1255084).\n- CVE-2025-68794: iomap: adjust read range correctly for non-block-aligned positions (bsc#1256647).\n- CVE-2025-71239: audit: add fchmodat2() to change attributes class (bsc#1259759).\n- CVE-2026-23072: l2tp: Fix memleak in l2tp_udp_encap_recv() (bsc#1257708).\n- CVE-2026-23103: ipvlan: Make the addrs_lock be per port (bsc#1257773).\n- CVE-2026-23120: l2tp: avoid one data-race in l2tp_tunnel_del_work() (bsc#1258280).\n- CVE-2026-23125: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT (bsc#1258293).\n- CVE-2026-23138: kABI: Preserve values of the trace recursion bits (bsc#1258301).\n- CVE-2026-23140: bpf, test_run: Subtract size of xdp_frame from allowed metadata size (bsc#1258305).\n- CVE-2026-23187: pmdomain: imx8m-blk-ctrl: fix out-of-range access of bc-\u003edomains (bsc#1258330).\n- CVE-2026-23193: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() (bsc#1258414).\n- CVE-2026-23201: ceph: fix oops due to invalid pointer for kfree() in parse_longname() (bsc#1258337).\n- CVE-2026-23204: net: add skb_header_pointer_careful() helper (bsc#1258340).\n- CVE-2026-23215: x86/vmware: Fix hypercall clobbers (bsc#1258476).\n- CVE-2026-23216: scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() (bsc#1258447).\n- CVE-2026-23231: netfilter: nf_tables: fix use-after-free in nf_tables_addchain() (bsc#1259188).\n- CVE-2026-23239: espintcp: Fix race condition in espintcp_close() (bsc#1259485).\n- CVE-2026-23240: tls: Fix race condition in tls_sw_cancel_work_tx() (bsc#1259484).\n- CVE-2026-23242: RDMA/siw: Fix potential NULL pointer dereference in header processing (bsc#1259795).\n- CVE-2026-23243: RDMA/umad: Reject negative data_len in ib_umad_write (bsc#1259797).\n- CVE-2026-23255: net: add proper RCU protection to /proc/net/ptype (bsc#1259891).\n- CVE-2026-23262: gve: Fix stats report corruption on queue count change (bsc#1259870).\n- CVE-2026-23270: net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks (bsc#1259886).\n- CVE-2026-23272: netfilter: nf_tables: unconditionally bump set-\u003enelems before insertion (bsc#1260009).\n- CVE-2026-23274: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels (bsc#1260005).\n- CVE-2026-23277: net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit (bsc#1259997).\n- CVE-2026-23278: netfilter: nf_tables: always walk all pending catchall elements (bsc#1259998).\n- CVE-2026-23281: wifi: libertas: fix use-after-free in lbs_free_adapter() (bsc#1260464).\n- CVE-2026-23292: scsi: target: Fix recursive locking in __configfs_open_file() (bsc#1260500).\n- CVE-2026-23293: net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled (bsc#1260486).\n- CVE-2026-23297: nfsd: Fix cred ref leak in nfsd_nl_threads_set_doit() (bsc#1260490).\n- CVE-2026-23304: ipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu() (bsc#1260544).\n- CVE-2026-23319: bpf: Fix a UAF issue in bpf_trampoline_link_cgroup_shim (bsc#1260735).\n- CVE-2026-23326: xsk: Fix fragment node deletion to prevent buffer leak (bsc#1260606).\n- CVE-2026-23335: RDMA/irdma: Fix kernel stack leak in irdma_create_user_ah() (bsc#1260550).\n- CVE-2026-23343: xdp: produce a warning when calculated tailroom is negative (bsc#1260527).\n- CVE-2026-23361: PCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry (bsc#1260732).\n- CVE-2026-23379: net/sched: ets: fix divide by zero in the offload path (bsc#1260481).\n- CVE-2026-23381: net: bridge: fix nd_tbl NULL dereference when IPv6 is disabled (bsc#1260471).\n- CVE-2026-23383: bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing (bsc#1260497).\n- CVE-2026-23386: gve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL (bsc#1260799).\n- CVE-2026-23393: bridge: cfm: Fix race condition in peer_mep deletion (bsc#1260522).\n- CVE-2026-23398: icmp: fix NULL pointer dereference in icmp_tag_validation() (bsc#1260730).\n- CVE-2026-23413: clsact: Fix use-after-free in init/destroy rollback asymmetry (bsc#1261498).\n- CVE-2026-23414: tls: Purge async_hold in tls_decrypt_async_wait() (bsc#1261496).\n- CVE-2026-23419: net/rds: Fix circular locking dependency in rds_tcp_tune (bsc#1261507).\n- CVE-2026-23425: KVM: arm64: Fix ID register initialization for non-protected pKVM guests (bsc#1261506).\n- CVE-2026-31788: xen/privcmd: restrict usage in unprivileged domU (bsc#1259707).\n\nThe following non security issues were fixed:\n\n- KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE (bsc#1259461).\n- KVM: x86: synthesize CPUID bits only if CPU capability is set (bsc#1257511).\n- Revert \"drm/i915/display: Add quirk to skip retraining of dp link (bsc#1253129).\"\n- Update config files (bsc#1254307).\n- apparmor: Fix double free of ns_name in aa_replace_profiles() (bsc#1258849).\n- apparmor: fix differential encoding verification (bsc#1258849).\n- apparmor: fix memory leak in verify_header (bsc#1258849).\n- apparmor: fix missing bounds check on DEFAULT table in verify_dfa() (bsc#1258849).\n- apparmor: fix race between freeing data and fs accessing it (bsc#1258849).\n- apparmor: fix race on rawdata dereference (bsc#1258849).\n- apparmor: fix side-effect bug in match_char() macro usage (bsc#1258849).\n- apparmor: fix unprivileged local user can do privileged policy management (bsc#1258849).\n- apparmor: fix: limit the number of levels of policy namespaces (bsc#1258849).\n- apparmor: replace recursive profile removal with iterative approach (bsc#1258849).\n- apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1258849).\n- bpf, btf: Enforce destructor kfunc type with CFI (bsc#1259955).\n- bpf: crypto: Use the correct destructor kfunc type (bsc#1259955).\n- btrfs: only enforce free space tree if v1 cache is required for bs \u003c ps cases (bsc#1260459).\n- btrfs: tracepoints: get correct superblock from dentry in event btrfs_sync_file() (bsc#1257777).\n- dmaengine: sh: rz-dmac: Move CHCTRL updates under spinlock (git-fixes).\n- drm/amdkfd: Unreserve bo if queue update failed (git-fixes).\n- drm/i915/display: Add module param to skip retraining of dp link (bsc#1253129).\n- drm/i915/dsc: Add Selective Update register definitions (stable-fixes).\n- drm/i915/dsc: Add helper for writing DSC Selective Update ET parameters (stable-fixes).\n- firmware: microchip: fail auto-update probe if no flash found (git-fixes).\n- kABI: Include trace recursion bits in kABI tracking (bsc#1258301).\n- net: mana: Trigger VF reset/recovery on health check failure due to HWC timeout (bsc#1259580).\n- nvme: add support for dynamic quirk configuration via module parameter (bsc#1243208).\n- nvme: expose active quirks in sysfs (bsc#1243208).\n- nvme: fix memory leak in quirks_param_set() (bsc#1243208).\n- powerpc/crash: adjust the elfcorehdr size (jsc#PED-11175 git-fixes).\n- powerpc/kdump: Fix size calculation for hot-removed memory ranges (jsc#PED-11175 git-fixes).\n- s390/cio: Update purge function to unregister the unused subchannels (bsc#1254214).\n- s390/ipl: Clear SBP flag when bootprog is set (bsc#1258175).\n- s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP (bsc#1254306).\n- scsi: fnic: Add Cisco hardware model names (jsc#PED-15441).\n- scsi: fnic: Add and integrate support for FDMI (jsc#PED-15441).\n- scsi: fnic: Add and integrate support for FIP (jsc#PED-15441).\n- scsi: fnic: Add functionality in fnic to support FDLS (jsc#PED-15441).\n- scsi: fnic: Add headers and definitions for FDLS (jsc#PED-15441).\n- scsi: fnic: Add stats and related functionality (jsc#PED-15441).\n- scsi: fnic: Add support for fabric based solicited requests and responses (jsc#PED-15441).\n- scsi: fnic: Add support for target based solicited requests and responses (jsc#PED-15441).\n- scsi: fnic: Add support for unsolicited requests and responses (jsc#PED-15441).\n- scsi: fnic: Add support to handle port channel RSCN (jsc#PED-15441).\n- scsi: fnic: Code cleanup (jsc#PED-15441).\n- scsi: fnic: Delete incorrect debugfs error handling (jsc#PED-15441).\n- scsi: fnic: Fix crash in fnic_wq_cmpl_handler when FDMI times out (jsc#PED-15441).\n- scsi: fnic: Fix indentation and remove unnecessary parenthesis (jsc#PED-15441).\n- scsi: fnic: Fix missing DMA mapping error in fnic_send_frame() (jsc#PED-15441).\n- scsi: fnic: Fix use of uninitialized value in debug message (jsc#PED-15441).\n- scsi: fnic: Increment driver version (jsc#PED-15441).\n- scsi: fnic: Modify IO path to use FDLS (jsc#PED-15441).\n- scsi: fnic: Modify fnic interfaces to use FDLS (jsc#PED-15441).\n- scsi: fnic: Propagate SCSI error code from fnic_scsi_drv_init() (jsc#PED-15441).\n- scsi: fnic: Remove always-true IS_FNIC_FCP_INITIATOR macro (jsc#PED-15441).\n- scsi: fnic: Remove extern definition from .c files (jsc#PED-15441).\n- scsi: fnic: Remove unnecessary debug print (jsc#PED-15441).\n- scsi: fnic: Remove unnecessary else and unnecessary break in FDLS (jsc#PED-15441).\n- scsi: fnic: Remove unnecessary else to fix warning in FDLS FIP (jsc#PED-15441).\n- scsi: fnic: Remove unnecessary spinlock locking and unlocking (jsc#PED-15441).\n- scsi: fnic: Replace fnic-\u003elock_flags with local flags (jsc#PED-15441).\n- scsi: fnic: Replace shost_printk() with dev_info()/dev_err() (jsc#PED-15441).\n- scsi: fnic: Replace use of sizeof with standard usage (jsc#PED-15441).\n- scsi: fnic: Return appropriate error code for mem alloc failure (jsc#PED-15441).\n- scsi: fnic: Return appropriate error code from failure of scsi drv init (jsc#PED-15441).\n- scsi: fnic: Test for memory allocation failure and return error code (jsc#PED-15441).\n- scsi: fnic: Turn off FDMI ACTIVE flags on link down (jsc#PED-15441).\n- scsi: hisi_sas: Fix NULL pointer exception during user_scan() (bsc#1255687).\n- scsi: scsi_transport_sas: Fix the maximum channel scanning issue (bsc#1255687, git-fixes).\n- scsi: smartpqi: Fix memory leak in pqi_report_phys_luns() (git-fixes, jsc#PED-15042).\n- selftests/bpf: Use the correct destructor kfunc type (bsc#1259955).\n- selftests/powerpc: Suppress -Wmaybe-uninitialized with GCC 15 (bsc#1261669 ltc#212590).\n- tg3: Fix race for querying speed/duplex (bsc#1257183).\n- x86/platform/uv: Handle deconfigured sockets (bsc#1260347).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SL-Micro-6.2-596",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_21237-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:21237-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202621237-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:21237-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045853.html"
},
{
"category": "self",
"summary": "SUSE Bug 1191256",
"url": "https://bugzilla.suse.com/1191256"
},
{
"category": "self",
"summary": "SUSE Bug 1191270",
"url": "https://bugzilla.suse.com/1191270"
},
{
"category": "self",
"summary": "SUSE Bug 1194778",
"url": "https://bugzilla.suse.com/1194778"
},
{
"category": "self",
"summary": "SUSE Bug 1207184",
"url": "https://bugzilla.suse.com/1207184"
},
{
"category": "self",
"summary": "SUSE Bug 1217845",
"url": "https://bugzilla.suse.com/1217845"
},
{
"category": "self",
"summary": "SUSE Bug 1222768",
"url": "https://bugzilla.suse.com/1222768"
},
{
"category": "self",
"summary": "SUSE Bug 1243208",
"url": "https://bugzilla.suse.com/1243208"
},
{
"category": "self",
"summary": "SUSE Bug 1252073",
"url": "https://bugzilla.suse.com/1252073"
},
{
"category": "self",
"summary": "SUSE Bug 1253129",
"url": "https://bugzilla.suse.com/1253129"
},
{
"category": "self",
"summary": "SUSE Bug 1254214",
"url": "https://bugzilla.suse.com/1254214"
},
{
"category": "self",
"summary": "SUSE Bug 1254306",
"url": "https://bugzilla.suse.com/1254306"
},
{
"category": "self",
"summary": "SUSE Bug 1254307",
"url": "https://bugzilla.suse.com/1254307"
},
{
"category": "self",
"summary": "SUSE Bug 1255084",
"url": "https://bugzilla.suse.com/1255084"
},
{
"category": "self",
"summary": "SUSE Bug 1255687",
"url": "https://bugzilla.suse.com/1255687"
},
{
"category": "self",
"summary": "SUSE Bug 1256647",
"url": "https://bugzilla.suse.com/1256647"
},
{
"category": "self",
"summary": "SUSE Bug 1257183",
"url": "https://bugzilla.suse.com/1257183"
},
{
"category": "self",
"summary": "SUSE Bug 1257511",
"url": "https://bugzilla.suse.com/1257511"
},
{
"category": "self",
"summary": "SUSE Bug 1257708",
"url": "https://bugzilla.suse.com/1257708"
},
{
"category": "self",
"summary": "SUSE Bug 1257773",
"url": "https://bugzilla.suse.com/1257773"
},
{
"category": "self",
"summary": "SUSE Bug 1257777",
"url": "https://bugzilla.suse.com/1257777"
},
{
"category": "self",
"summary": "SUSE Bug 1258175",
"url": "https://bugzilla.suse.com/1258175"
},
{
"category": "self",
"summary": "SUSE Bug 1258280",
"url": "https://bugzilla.suse.com/1258280"
},
{
"category": "self",
"summary": "SUSE Bug 1258293",
"url": "https://bugzilla.suse.com/1258293"
},
{
"category": "self",
"summary": "SUSE Bug 1258301",
"url": "https://bugzilla.suse.com/1258301"
},
{
"category": "self",
"summary": "SUSE Bug 1258305",
"url": "https://bugzilla.suse.com/1258305"
},
{
"category": "self",
"summary": "SUSE Bug 1258330",
"url": "https://bugzilla.suse.com/1258330"
},
{
"category": "self",
"summary": "SUSE Bug 1258337",
"url": "https://bugzilla.suse.com/1258337"
},
{
"category": "self",
"summary": "SUSE Bug 1258340",
"url": "https://bugzilla.suse.com/1258340"
},
{
"category": "self",
"summary": "SUSE Bug 1258414",
"url": "https://bugzilla.suse.com/1258414"
},
{
"category": "self",
"summary": "SUSE Bug 1258447",
"url": "https://bugzilla.suse.com/1258447"
},
{
"category": "self",
"summary": "SUSE Bug 1258476",
"url": "https://bugzilla.suse.com/1258476"
},
{
"category": "self",
"summary": "SUSE Bug 1258849",
"url": "https://bugzilla.suse.com/1258849"
},
{
"category": "self",
"summary": "SUSE Bug 1259188",
"url": "https://bugzilla.suse.com/1259188"
},
{
"category": "self",
"summary": "SUSE Bug 1259461",
"url": "https://bugzilla.suse.com/1259461"
},
{
"category": "self",
"summary": "SUSE Bug 1259484",
"url": "https://bugzilla.suse.com/1259484"
},
{
"category": "self",
"summary": "SUSE Bug 1259485",
"url": "https://bugzilla.suse.com/1259485"
},
{
"category": "self",
"summary": "SUSE Bug 1259580",
"url": "https://bugzilla.suse.com/1259580"
},
{
"category": "self",
"summary": "SUSE Bug 1259707",
"url": "https://bugzilla.suse.com/1259707"
},
{
"category": "self",
"summary": "SUSE Bug 1259759",
"url": "https://bugzilla.suse.com/1259759"
},
{
"category": "self",
"summary": "SUSE Bug 1259795",
"url": "https://bugzilla.suse.com/1259795"
},
{
"category": "self",
"summary": "SUSE Bug 1259797",
"url": "https://bugzilla.suse.com/1259797"
},
{
"category": "self",
"summary": "SUSE Bug 1259870",
"url": "https://bugzilla.suse.com/1259870"
},
{
"category": "self",
"summary": "SUSE Bug 1259886",
"url": "https://bugzilla.suse.com/1259886"
},
{
"category": "self",
"summary": "SUSE Bug 1259891",
"url": "https://bugzilla.suse.com/1259891"
},
{
"category": "self",
"summary": "SUSE Bug 1259955",
"url": "https://bugzilla.suse.com/1259955"
},
{
"category": "self",
"summary": "SUSE Bug 1259997",
"url": "https://bugzilla.suse.com/1259997"
},
{
"category": "self",
"summary": "SUSE Bug 1259998",
"url": "https://bugzilla.suse.com/1259998"
},
{
"category": "self",
"summary": "SUSE Bug 1260005",
"url": "https://bugzilla.suse.com/1260005"
},
{
"category": "self",
"summary": "SUSE Bug 1260009",
"url": "https://bugzilla.suse.com/1260009"
},
{
"category": "self",
"summary": "SUSE Bug 1260347",
"url": "https://bugzilla.suse.com/1260347"
},
{
"category": "self",
"summary": "SUSE Bug 1260459",
"url": "https://bugzilla.suse.com/1260459"
},
{
"category": "self",
"summary": "SUSE Bug 1260464",
"url": "https://bugzilla.suse.com/1260464"
},
{
"category": "self",
"summary": "SUSE Bug 1260471",
"url": "https://bugzilla.suse.com/1260471"
},
{
"category": "self",
"summary": "SUSE Bug 1260481",
"url": "https://bugzilla.suse.com/1260481"
},
{
"category": "self",
"summary": "SUSE Bug 1260486",
"url": "https://bugzilla.suse.com/1260486"
},
{
"category": "self",
"summary": "SUSE Bug 1260490",
"url": "https://bugzilla.suse.com/1260490"
},
{
"category": "self",
"summary": "SUSE Bug 1260497",
"url": "https://bugzilla.suse.com/1260497"
},
{
"category": "self",
"summary": "SUSE Bug 1260500",
"url": "https://bugzilla.suse.com/1260500"
},
{
"category": "self",
"summary": "SUSE Bug 1260522",
"url": "https://bugzilla.suse.com/1260522"
},
{
"category": "self",
"summary": "SUSE Bug 1260527",
"url": "https://bugzilla.suse.com/1260527"
},
{
"category": "self",
"summary": "SUSE Bug 1260544",
"url": "https://bugzilla.suse.com/1260544"
},
{
"category": "self",
"summary": "SUSE Bug 1260550",
"url": "https://bugzilla.suse.com/1260550"
},
{
"category": "self",
"summary": "SUSE Bug 1260606",
"url": "https://bugzilla.suse.com/1260606"
},
{
"category": "self",
"summary": "SUSE Bug 1260730",
"url": "https://bugzilla.suse.com/1260730"
},
{
"category": "self",
"summary": "SUSE Bug 1260732",
"url": "https://bugzilla.suse.com/1260732"
},
{
"category": "self",
"summary": "SUSE Bug 1260735",
"url": "https://bugzilla.suse.com/1260735"
},
{
"category": "self",
"summary": "SUSE Bug 1260799",
"url": "https://bugzilla.suse.com/1260799"
},
{
"category": "self",
"summary": "SUSE Bug 1261496",
"url": "https://bugzilla.suse.com/1261496"
},
{
"category": "self",
"summary": "SUSE Bug 1261498",
"url": "https://bugzilla.suse.com/1261498"
},
{
"category": "self",
"summary": "SUSE Bug 1261506",
"url": "https://bugzilla.suse.com/1261506"
},
{
"category": "self",
"summary": "SUSE Bug 1261507",
"url": "https://bugzilla.suse.com/1261507"
},
{
"category": "self",
"summary": "SUSE Bug 1261669",
"url": "https://bugzilla.suse.com/1261669"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-39998 page",
"url": "https://www.suse.com/security/cve/CVE-2025-39998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-40253 page",
"url": "https://www.suse.com/security/cve/CVE-2025-40253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-68794 page",
"url": "https://www.suse.com/security/cve/CVE-2025-68794/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-71239 page",
"url": "https://www.suse.com/security/cve/CVE-2025-71239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23072 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23072/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23103 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23120 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23125 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23138 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23138/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23140 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23140/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23187 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23193 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23193/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23201 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23204 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23215 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23215/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23216 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23216/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23231 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23239 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23239/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23240 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23240/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23242 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23242/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23243 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23243/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23255 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23255/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23262 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23262/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23270 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23270/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23272 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23272/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23274 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23274/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23277 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23277/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23278 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23278/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23281 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23281/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23292 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23292/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23293 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23293/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23297 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23297/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23304 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23319 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23326 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23326/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23335 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23335/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23343 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23343/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23361 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23361/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23379 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23381 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23383 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23383/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23386 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23393 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23393/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23398 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23398/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23413 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23413/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23414 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23414/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23419 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23419/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23425 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23425/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31788 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31788/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-04-20T15:44:52Z",
"generator": {
"date": "2026-04-20T15:44:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:21237-1",
"initial_release_date": "2026-04-20T15:44:52Z",
"revision_history": [
{
"date": "2026-04-20T15:44:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-64kb-6.12.0-160000.28.1.aarch64",
"product": {
"name": "kernel-64kb-6.12.0-160000.28.1.aarch64",
"product_id": "kernel-64kb-6.12.0-160000.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"product": {
"name": "kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"product_id": "kernel-64kb-devel-6.12.0-160000.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.28.1.aarch64",
"product": {
"name": "kernel-default-6.12.0-160000.28.1.aarch64",
"product_id": "kernel-default-6.12.0-160000.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"product": {
"name": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"product_id": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.28.1.aarch64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.28.1.aarch64",
"product_id": "kernel-default-devel-6.12.0-160000.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.28.1.aarch64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.28.1.aarch64",
"product_id": "kernel-default-extra-6.12.0-160000.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.12.0-160000.28.1.aarch64",
"product": {
"name": "kernel-rt-6.12.0-160000.28.1.aarch64",
"product_id": "kernel-rt-6.12.0-160000.28.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"product": {
"name": "kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"product_id": "kernel-rt-devel-6.12.0-160000.28.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.12.0-160000.28.1.noarch",
"product": {
"name": "kernel-devel-6.12.0-160000.28.1.noarch",
"product_id": "kernel-devel-6.12.0-160000.28.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.12.0-160000.28.1.noarch",
"product": {
"name": "kernel-macros-6.12.0-160000.28.1.noarch",
"product_id": "kernel-macros-6.12.0-160000.28.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.12.0-160000.28.1.noarch",
"product": {
"name": "kernel-source-6.12.0-160000.28.1.noarch",
"product_id": "kernel-source-6.12.0-160000.28.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.28.1.ppc64le",
"product": {
"name": "kernel-default-6.12.0-160000.28.1.ppc64le",
"product_id": "kernel-default-6.12.0-160000.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"product": {
"name": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"product_id": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"product_id": "kernel-default-devel-6.12.0-160000.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"product": {
"name": "kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"product_id": "kernel-default-extra-6.12.0-160000.28.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"product_id": "kernel-default-livepatch-6.12.0-160000.28.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.28.1.s390x",
"product": {
"name": "kernel-default-6.12.0-160000.28.1.s390x",
"product_id": "kernel-default-6.12.0-160000.28.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.28.1.s390x",
"product": {
"name": "kernel-default-devel-6.12.0-160000.28.1.s390x",
"product_id": "kernel-default-devel-6.12.0-160000.28.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.28.1.s390x",
"product": {
"name": "kernel-default-extra-6.12.0-160000.28.1.s390x",
"product_id": "kernel-default-extra-6.12.0-160000.28.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"product_id": "kernel-default-livepatch-6.12.0-160000.28.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-6.12.0-160000.28.1.x86_64",
"product": {
"name": "kernel-default-6.12.0-160000.28.1.x86_64",
"product_id": "kernel-default-6.12.0-160000.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"product": {
"name": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"product_id": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.12.0-160000.28.1.x86_64",
"product": {
"name": "kernel-default-devel-6.12.0-160000.28.1.x86_64",
"product_id": "kernel-default-devel-6.12.0-160000.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.12.0-160000.28.1.x86_64",
"product": {
"name": "kernel-default-extra-6.12.0-160000.28.1.x86_64",
"product_id": "kernel-default-extra-6.12.0-160000.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"product_id": "kernel-default-livepatch-6.12.0-160000.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.12.0-160000.28.1.x86_64",
"product": {
"name": "kernel-rt-6.12.0-160000.28.1.x86_64",
"product_id": "kernel-rt-6.12.0-160000.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"product": {
"name": "kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"product_id": "kernel-rt-devel-6.12.0-160000.28.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"product_id": "kernel-rt-livepatch-6.12.0-160000.28.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.2",
"product": {
"name": "SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.12.0-160000.28.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64"
},
"product_reference": "kernel-64kb-6.12.0-160000.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.12.0-160000.28.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.28.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64"
},
"product_reference": "kernel-default-6.12.0-160000.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.28.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le"
},
"product_reference": "kernel-default-6.12.0-160000.28.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.28.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x"
},
"product_reference": "kernel-default-6.12.0-160000.28.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.12.0-160000.28.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64"
},
"product_reference": "kernel-default-6.12.0-160000.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64"
},
"product_reference": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le"
},
"product_reference": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64"
},
"product_reference": "kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.28.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.28.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.28.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x"
},
"product_reference": "kernel-default-devel-6.12.0-160000.28.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.12.0-160000.28.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64"
},
"product_reference": "kernel-default-devel-6.12.0-160000.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.28.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.28.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le"
},
"product_reference": "kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.28.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x"
},
"product_reference": "kernel-default-extra-6.12.0-160000.28.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.12.0-160000.28.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64"
},
"product_reference": "kernel-default-extra-6.12.0-160000.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.28.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.28.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.12.0-160000.28.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.12.0-160000.28.1.noarch as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch"
},
"product_reference": "kernel-devel-6.12.0-160000.28.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.12.0-160000.28.1.noarch as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch"
},
"product_reference": "kernel-macros-6.12.0-160000.28.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.12.0-160000.28.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64"
},
"product_reference": "kernel-rt-6.12.0-160000.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.12.0-160000.28.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64"
},
"product_reference": "kernel-rt-6.12.0-160000.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.12.0-160000.28.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64"
},
"product_reference": "kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.12.0-160000.28.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64"
},
"product_reference": "kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-livepatch-6.12.0-160000.28.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64"
},
"product_reference": "kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.12.0-160000.28.1.noarch as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
},
"product_reference": "kernel-source-6.12.0-160000.28.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-39998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-39998"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: target_core_configfs: Add length check to avoid buffer overflow\n\nA buffer overflow arises from the usage of snprintf to write into the\nbuffer \"buf\" in target_lu_gp_members_show function located in\n/drivers/target/target_core_configfs.c. This buffer is allocated with\nsize LU_GROUP_NAME_BUF (256 bytes).\n\nsnprintf(...) formats multiple strings into buf with the HBA name\n(hba-\u003ehba_group.cg_item), a slash character, a devicename (dev-\u003e\ndev_group.cg_item) and a newline character, the total formatted string\nlength may exceed the buffer size of 256 bytes.\n\nSince snprintf() returns the total number of bytes that would have been\nwritten (the length of %s/%sn ), this value may exceed the buffer length\n(256 bytes) passed to memcpy(), this will ultimately cause function\nmemcpy reporting a buffer overflow error.\n\nAn additional check of the return value of snprintf() can avoid this\nbuffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-39998",
"url": "https://www.suse.com/security/cve/CVE-2025-39998"
},
{
"category": "external",
"summary": "SUSE Bug 1252073 for CVE-2025-39998",
"url": "https://bugzilla.suse.com/1252073"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2025-39998"
},
{
"cve": "CVE-2025-40253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-40253"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/ctcm: Fix double-kfree\n\nThe function \u0027mpc_rcvd_sweep_req(mpcginfo)\u0027 is called conditionally\nfrom function \u0027ctcmpc_unpack_skb\u0027. It frees passed mpcginfo.\nAfter that a call to function \u0027kfree\u0027 in function \u0027ctcmpc_unpack_skb\u0027\nfrees it again.\n\nRemove \u0027kfree\u0027 call in function \u0027mpc_rcvd_sweep_req(mpcginfo)\u0027.\n\nBug detected by the clang static analyzer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-40253",
"url": "https://www.suse.com/security/cve/CVE-2025-40253"
},
{
"category": "external",
"summary": "SUSE Bug 1255084 for CVE-2025-40253",
"url": "https://bugzilla.suse.com/1255084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2025-40253"
},
{
"cve": "CVE-2025-68794",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-68794"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niomap: adjust read range correctly for non-block-aligned positions\n\niomap_adjust_read_range() assumes that the position and length passed in\nare block-aligned. This is not always the case however, as shown in the\nsyzbot generated case for erofs. This causes too many bytes to be\nskipped for uptodate blocks, which results in returning the incorrect\nposition and length to read in. If all the blocks are uptodate, this\nunderflows length and returns a position beyond the folio.\n\nFix the calculation to also take into account the block offset when\ncalculating how many bytes can be skipped for uptodate blocks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-68794",
"url": "https://www.suse.com/security/cve/CVE-2025-68794"
},
{
"category": "external",
"summary": "SUSE Bug 1256647 for CVE-2025-68794",
"url": "https://bugzilla.suse.com/1256647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2025-68794"
},
{
"cve": "CVE-2025-71239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-71239"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naudit: add fchmodat2() to change attributes class\n\nfchmodat2(), introduced in version 6.6 is currently not in the change\nattribute class of audit. Calling fchmodat2() to change a file\nattribute in the same fashion than chmod() or fchmodat() will bypass\naudit rules such as:\n\n-w /tmp/test -p rwa -k test_rwa\n\nThe current patch adds fchmodat2() to the change attributes class.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-71239",
"url": "https://www.suse.com/security/cve/CVE-2025-71239"
},
{
"category": "external",
"summary": "SUSE Bug 1259759 for CVE-2025-71239",
"url": "https://bugzilla.suse.com/1259759"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "low"
}
],
"title": "CVE-2025-71239"
},
{
"cve": "CVE-2026-23072",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23072"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nl2tp: Fix memleak in l2tp_udp_encap_recv().\n\nsyzbot reported memleak of struct l2tp_session, l2tp_tunnel,\nsock, etc. [0]\n\nThe cited commit moved down the validation of the protocol\nversion in l2tp_udp_encap_recv().\n\nThe new place requires an extra error handling to avoid the\nmemleak.\n\nLet\u0027s call l2tp_session_put() there.\n\n[0]:\nBUG: memory leak\nunreferenced object 0xffff88810a290200 (size 512):\n comm \"syz.0.17\", pid 6086, jiffies 4294944299\n hex dump (first 32 bytes):\n 7d eb 04 0c 00 00 00 00 01 00 00 00 00 00 00 00 }...............\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc babb6a4f):\n kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]\n slab_post_alloc_hook mm/slub.c:4958 [inline]\n slab_alloc_node mm/slub.c:5263 [inline]\n __do_kmalloc_node mm/slub.c:5656 [inline]\n __kmalloc_noprof+0x3e0/0x660 mm/slub.c:5669\n kmalloc_noprof include/linux/slab.h:961 [inline]\n kzalloc_noprof include/linux/slab.h:1094 [inline]\n l2tp_session_create+0x3a/0x3b0 net/l2tp/l2tp_core.c:1778\n pppol2tp_connect+0x48b/0x920 net/l2tp/l2tp_ppp.c:755\n __sys_connect_file+0x7a/0xb0 net/socket.c:2089\n __sys_connect+0xde/0x110 net/socket.c:2108\n __do_sys_connect net/socket.c:2114 [inline]\n __se_sys_connect net/socket.c:2111 [inline]\n __x64_sys_connect+0x1c/0x30 net/socket.c:2111\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23072",
"url": "https://www.suse.com/security/cve/CVE-2026-23072"
},
{
"category": "external",
"summary": "SUSE Bug 1257708 for CVE-2026-23072",
"url": "https://bugzilla.suse.com/1257708"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23072"
},
{
"cve": "CVE-2026-23103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23103"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: Make the addrs_lock be per port\n\nMake the addrs_lock be per port, not per ipvlan dev.\n\nInitial code seems to be written in the assumption,\nthat any address change must occur under RTNL.\nBut it is not so for the case of IPv6. So\n\n1) Introduce per-port addrs_lock.\n\n2) It was needed to fix places where it was forgotten\nto take lock (ipvlan_open/ipvlan_close)\n\nThis appears to be a very minor problem though.\nSince it\u0027s highly unlikely that ipvlan_add_addr() will\nbe called on 2 CPU simultaneously. But nevertheless,\nthis could cause:\n\n1) False-negative of ipvlan_addr_busy(): one interface\niterated through all port-\u003eipvlans + ipvlan-\u003eaddrs\nunder some ipvlan spinlock, and another added IP\nunder its own lock. Though this is only possible\nfor IPv6, since looks like only ipvlan_addr6_event() can be\ncalled without rtnl_lock.\n\n2) Race since ipvlan_ht_addr_add(port) is called under\ndifferent ipvlan-\u003eaddrs_lock locks\n\nThis should not affect performance, since add/remove IP\nis a rare situation and spinlock is not taken on fast\npaths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23103",
"url": "https://www.suse.com/security/cve/CVE-2026-23103"
},
{
"category": "external",
"summary": "SUSE Bug 1257773 for CVE-2026-23103",
"url": "https://bugzilla.suse.com/1257773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23103"
},
{
"cve": "CVE-2026-23120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23120"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nl2tp: avoid one data-race in l2tp_tunnel_del_work()\n\nWe should read sk-\u003esk_socket only when dealing with kernel sockets.\n\nsyzbot reported the following data-race:\n\nBUG: KCSAN: data-race in l2tp_tunnel_del_work / sk_common_release\n\nwrite to 0xffff88811c182b20 of 8 bytes by task 5365 on cpu 0:\n sk_set_socket include/net/sock.h:2092 [inline]\n sock_orphan include/net/sock.h:2118 [inline]\n sk_common_release+0xae/0x230 net/core/sock.c:4003\n udp_lib_close+0x15/0x20 include/net/udp.h:325\n inet_release+0xce/0xf0 net/ipv4/af_inet.c:437\n __sock_release net/socket.c:662 [inline]\n sock_close+0x6b/0x150 net/socket.c:1455\n __fput+0x29b/0x650 fs/file_table.c:468\n ____fput+0x1c/0x30 fs/file_table.c:496\n task_work_run+0x131/0x1a0 kernel/task_work.c:233\n resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]\n __exit_to_user_mode_loop kernel/entry/common.c:44 [inline]\n exit_to_user_mode_loop+0x1fe/0x740 kernel/entry/common.c:75\n __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline]\n syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline]\n syscall_exit_to_user_mode_work include/linux/entry-common.h:159 [inline]\n syscall_exit_to_user_mode include/linux/entry-common.h:194 [inline]\n do_syscall_64+0x1e1/0x2b0 arch/x86/entry/syscall_64.c:100\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nread to 0xffff88811c182b20 of 8 bytes by task 827 on cpu 1:\n l2tp_tunnel_del_work+0x2f/0x1a0 net/l2tp/l2tp_core.c:1418\n process_one_work kernel/workqueue.c:3257 [inline]\n process_scheduled_works+0x4ce/0x9d0 kernel/workqueue.c:3340\n worker_thread+0x582/0x770 kernel/workqueue.c:3421\n kthread+0x489/0x510 kernel/kthread.c:463\n ret_from_fork+0x149/0x290 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246\n\nvalue changed: 0xffff88811b818000 -\u003e 0x0000000000000000",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23120",
"url": "https://www.suse.com/security/cve/CVE-2026-23120"
},
{
"category": "external",
"summary": "SUSE Bug 1258280 for CVE-2026-23120",
"url": "https://bugzilla.suse.com/1258280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23120"
},
{
"cve": "CVE-2026-23125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23125"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT\n\nA null-ptr-deref was reported in the SCTP transmit path when SCTP-AUTH key\ninitialization fails:\n\n ==================================================================\n KASAN: null-ptr-deref in range [0x0000000000000018-0x000000000000001f]\n CPU: 0 PID: 16 Comm: ksoftirqd/0 Tainted: G W 6.6.0 #2\n RIP: 0010:sctp_packet_bundle_auth net/sctp/output.c:264 [inline]\n RIP: 0010:sctp_packet_append_chunk+0xb36/0x1260 net/sctp/output.c:401\n Call Trace:\n\n sctp_packet_transmit_chunk+0x31/0x250 net/sctp/output.c:189\n sctp_outq_flush_data+0xa29/0x26d0 net/sctp/outqueue.c:1111\n sctp_outq_flush+0xc80/0x1240 net/sctp/outqueue.c:1217\n sctp_cmd_interpreter.isra.0+0x19a5/0x62c0 net/sctp/sm_sideeffect.c:1787\n sctp_side_effects net/sctp/sm_sideeffect.c:1198 [inline]\n sctp_do_sm+0x1a3/0x670 net/sctp/sm_sideeffect.c:1169\n sctp_assoc_bh_rcv+0x33e/0x640 net/sctp/associola.c:1052\n sctp_inq_push+0x1dd/0x280 net/sctp/inqueue.c:88\n sctp_rcv+0x11ae/0x3100 net/sctp/input.c:243\n sctp6_rcv+0x3d/0x60 net/sctp/ipv6.c:1127\n\nThe issue is triggered when sctp_auth_asoc_init_active_key() fails in\nsctp_sf_do_5_1C_ack() while processing an INIT_ACK. In this case, the\ncommand sequence is currently:\n\n- SCTP_CMD_PEER_INIT\n- SCTP_CMD_TIMER_STOP (T1_INIT)\n- SCTP_CMD_TIMER_START (T1_COOKIE)\n- SCTP_CMD_NEW_STATE (COOKIE_ECHOED)\n- SCTP_CMD_ASSOC_SHKEY\n- SCTP_CMD_GEN_COOKIE_ECHO\n\nIf SCTP_CMD_ASSOC_SHKEY fails, asoc-\u003eshkey remains NULL, while\nasoc-\u003epeer.auth_capable and asoc-\u003epeer.peer_chunks have already been set by\nSCTP_CMD_PEER_INIT. This allows a DATA chunk with auth = 1 and shkey = NULL\nto be queued by sctp_datamsg_from_user().\n\nSince command interpretation stops on failure, no COOKIE_ECHO should been\nsent via SCTP_CMD_GEN_COOKIE_ECHO. However, the T1_COOKIE timer has already\nbeen started, and it may enqueue a COOKIE_ECHO into the outqueue later. As\na result, the DATA chunk can be transmitted together with the COOKIE_ECHO\nin sctp_outq_flush_data(), leading to the observed issue.\n\nSimilar to the other places where it calls sctp_auth_asoc_init_active_key()\nright after sctp_process_init(), this patch moves the SCTP_CMD_ASSOC_SHKEY\nimmediately after SCTP_CMD_PEER_INIT, before stopping T1_INIT and starting\nT1_COOKIE. This ensures that if shared key generation fails, authenticated\nDATA cannot be sent. It also allows the T1_INIT timer to retransmit INIT,\ngiving the client another chance to process INIT_ACK and retry key setup.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23125",
"url": "https://www.suse.com/security/cve/CVE-2026-23125"
},
{
"category": "external",
"summary": "SUSE Bug 1258293 for CVE-2026-23125",
"url": "https://bugzilla.suse.com/1258293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23125"
},
{
"cve": "CVE-2026-23138",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23138"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Add recursion protection in kernel stack trace recording\n\nA bug was reported about an infinite recursion caused by tracing the rcu\nevents with the kernel stack trace trigger enabled. The stack trace code\ncalled back into RCU which then called the stack trace again.\n\nExpand the ftrace recursion protection to add a set of bits to protect\nevents from recursion. Each bit represents the context that the event is\nin (normal, softirq, interrupt and NMI).\n\nHave the stack trace code use the interrupt context to protect against\nrecursion.\n\nNote, the bug showed an issue in both the RCU code as well as the tracing\nstacktrace code. This only handles the tracing stack trace side of the\nbug. The RCU fix will be handled separately.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23138",
"url": "https://www.suse.com/security/cve/CVE-2026-23138"
},
{
"category": "external",
"summary": "SUSE Bug 1258301 for CVE-2026-23138",
"url": "https://bugzilla.suse.com/1258301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23138"
},
{
"cve": "CVE-2026-23140",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23140"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, test_run: Subtract size of xdp_frame from allowed metadata size\n\nThe xdp_frame structure takes up part of the XDP frame headroom,\nlimiting the size of the metadata. However, in bpf_test_run, we don\u0027t\ntake this into account, which makes it possible for userspace to supply\na metadata size that is too large (taking up the entire headroom).\n\nIf userspace supplies such a large metadata size in live packet mode,\nthe xdp_update_frame_from_buff() call in xdp_test_run_init_page() call\nwill fail, after which packet transmission proceeds with an\nuninitialised frame structure, leading to the usual Bad Stuff.\n\nThe commit in the Fixes tag fixed a related bug where the second check\nin xdp_update_frame_from_buff() could fail, but did not add any\nadditional constraints on the metadata size. Complete the fix by adding\nan additional check on the metadata size. Reorder the checks slightly to\nmake the logic clearer and add a comment.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23140",
"url": "https://www.suse.com/security/cve/CVE-2026-23140"
},
{
"category": "external",
"summary": "SUSE Bug 1258305 for CVE-2026-23140",
"url": "https://bugzilla.suse.com/1258305"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23140"
},
{
"cve": "CVE-2026-23187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23187"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npmdomain: imx8m-blk-ctrl: fix out-of-range access of bc-\u003edomains\n\nFix out-of-range access of bc-\u003edomains in imx8m_blk_ctrl_remove().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23187",
"url": "https://www.suse.com/security/cve/CVE-2026-23187"
},
{
"category": "external",
"summary": "SUSE Bug 1258330 for CVE-2026-23187",
"url": "https://bugzilla.suse.com/1258330"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23187"
},
{
"cve": "CVE-2026-23193",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23193"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()\n\nIn iscsit_dec_session_usage_count(), the function calls complete() while\nholding the sess-\u003esession_usage_lock. Similar to the connection usage count\nlogic, the waiter signaled by complete() (e.g., in the session release\npath) may wake up and free the iscsit_session structure immediately.\n\nThis creates a race condition where the current thread may attempt to\nexecute spin_unlock_bh() on a session structure that has already been\ndeallocated, resulting in a KASAN slab-use-after-free.\n\nTo resolve this, release the session_usage_lock before calling complete()\nto ensure all dereferences of the sess pointer are finished before the\nwaiter is allowed to proceed with deallocation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23193",
"url": "https://www.suse.com/security/cve/CVE-2026-23193"
},
{
"category": "external",
"summary": "SUSE Bug 1258414 for CVE-2026-23193",
"url": "https://bugzilla.suse.com/1258414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23193"
},
{
"cve": "CVE-2026-23201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: fix oops due to invalid pointer for kfree() in parse_longname()\n\nThis fixes a kernel oops when reading ceph snapshot directories (.snap),\nfor example by simply running `ls /mnt/my_ceph/.snap`.\n\nThe variable str is guarded by __free(kfree), but advanced by one for\nskipping the initial \u0027_\u0027 in snapshot names. Thus, kfree() is called\nwith an invalid pointer. This patch removes the need for advancing the\npointer so kfree() is called with correct memory pointer.\n\nSteps to reproduce:\n\n1. Create snapshots on a cephfs volume (I\u0027ve 63 snaps in my testcase)\n\n2. Add cephfs mount to fstab\n$ echo \"samba-fileserver@.files=/volumes/datapool/stuff/3461082b-ecc9-4e82-8549-3fd2590d3fb6 /mnt/test/stuff ceph acl,noatime,_netdev 0 0\" \u003e\u003e /etc/fstab\n\n3. Reboot the system\n$ systemctl reboot\n\n4. Check if it\u0027s really mounted\n$ mount | grep stuff\n\n5. List snapshots (expected 63 snapshots on my system)\n$ ls /mnt/test/stuff/.snap\n\nNow ls hangs forever and the kernel log shows the oops.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23201",
"url": "https://www.suse.com/security/cve/CVE-2026-23201"
},
{
"category": "external",
"summary": "SUSE Bug 1258337 for CVE-2026-23201",
"url": "https://bugzilla.suse.com/1258337"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23201"
},
{
"cve": "CVE-2026-23204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23204"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: cls_u32: use skb_header_pointer_careful()\n\nskb_header_pointer() does not fully validate negative @offset values.\n\nUse skb_header_pointer_careful() instead.\n\nGangMin Kim provided a report and a repro fooling u32_classify():\n\nBUG: KASAN: slab-out-of-bounds in u32_classify+0x1180/0x11b0\nnet/sched/cls_u32.c:221",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23204",
"url": "https://www.suse.com/security/cve/CVE-2026-23204"
},
{
"category": "external",
"summary": "SUSE Bug 1258340 for CVE-2026-23204",
"url": "https://bugzilla.suse.com/1258340"
},
{
"category": "external",
"summary": "SUSE Bug 1259126 for CVE-2026-23204",
"url": "https://bugzilla.suse.com/1259126"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "important"
}
],
"title": "CVE-2026-23204"
},
{
"cve": "CVE-2026-23215",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23215"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/vmware: Fix hypercall clobbers\n\nFedora QA reported the following panic:\n\n BUG: unable to handle page fault for address: 0000000040003e54\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS edk2-20251119-3.fc43 11/19/2025\n RIP: 0010:vmware_hypercall4.constprop.0+0x52/0x90\n ..\n Call Trace:\n vmmouse_report_events+0x13e/0x1b0\n psmouse_handle_byte+0x15/0x60\n ps2_interrupt+0x8a/0xd0\n ...\n\nbecause the QEMU VMware mouse emulation is buggy, and clears the top 32\nbits of %rdi that the kernel kept a pointer in.\n\nThe QEMU vmmouse driver saves and restores the register state in a\n\"uint32_t data[6];\" and as a result restores the state with the high\nbits all cleared.\n\nRDI originally contained the value of a valid kernel stack address\n(0xff5eeb3240003e54). After the vmware hypercall it now contains\n0x40003e54, and we get a page fault as a result when it is dereferenced.\n\nThe proper fix would be in QEMU, but this works around the issue in the\nkernel to keep old setups working, when old kernels had not happened to\nkeep any state in %rdi over the hypercall.\n\nIn theory this same issue exists for all the hypercalls in the vmmouse\ndriver; in practice it has only been seen with vmware_hypercall3() and\nvmware_hypercall4(). For now, just mark RDI/RSI as clobbered for those\ntwo calls. This should have a minimal effect on code generation overall\nas it should be rare for the compiler to want to make RDI/RSI live\nacross hypercalls.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23215",
"url": "https://www.suse.com/security/cve/CVE-2026-23215"
},
{
"category": "external",
"summary": "SUSE Bug 1258476 for CVE-2026-23215",
"url": "https://bugzilla.suse.com/1258476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23215"
},
{
"cve": "CVE-2026-23216",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23216"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()\n\nIn iscsit_dec_conn_usage_count(), the function calls complete() while\nholding the conn-\u003econn_usage_lock. As soon as complete() is invoked, the\nwaiter (such as iscsit_close_connection()) may wake up and proceed to free\nthe iscsit_conn structure.\n\nIf the waiter frees the memory before the current thread reaches\nspin_unlock_bh(), it results in a KASAN slab-use-after-free as the function\nattempts to release a lock within the already-freed connection structure.\n\nFix this by releasing the spinlock before calling complete().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23216",
"url": "https://www.suse.com/security/cve/CVE-2026-23216"
},
{
"category": "external",
"summary": "SUSE Bug 1258447 for CVE-2026-23216",
"url": "https://bugzilla.suse.com/1258447"
},
{
"category": "external",
"summary": "SUSE Bug 1258448 for CVE-2026-23216",
"url": "https://bugzilla.suse.com/1258448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23216"
},
{
"cve": "CVE-2026-23231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23231"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix use-after-free in nf_tables_addchain()\n\nnf_tables_addchain() publishes the chain to table-\u003echains via\nlist_add_tail_rcu() (in nft_chain_add()) before registering hooks.\nIf nf_tables_register_hook() then fails, the error path calls\nnft_chain_del() (list_del_rcu()) followed by nf_tables_chain_destroy()\nwith no RCU grace period in between.\n\nThis creates two use-after-free conditions:\n\n 1) Control-plane: nf_tables_dump_chains() traverses table-\u003echains\n under rcu_read_lock(). A concurrent dump can still be walking\n the chain when the error path frees it.\n\n 2) Packet path: for NFPROTO_INET, nf_register_net_hook() briefly\n installs the IPv4 hook before IPv6 registration fails. Packets\n entering nft_do_chain() via the transient IPv4 hook can still be\n dereferencing chain-\u003eblob_gen_X when the error path frees the\n chain.\n\nAdd synchronize_rcu() between nft_chain_del() and the chain destroy\nso that all RCU readers -- both dump threads and in-flight packet\nevaluation -- have finished before the chain is freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23231",
"url": "https://www.suse.com/security/cve/CVE-2026-23231"
},
{
"category": "external",
"summary": "SUSE Bug 1259188 for CVE-2026-23231",
"url": "https://bugzilla.suse.com/1259188"
},
{
"category": "external",
"summary": "SUSE Bug 1259189 for CVE-2026-23231",
"url": "https://bugzilla.suse.com/1259189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "important"
}
],
"title": "CVE-2026-23231"
},
{
"cve": "CVE-2026-23239",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23239"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nespintcp: Fix race condition in espintcp_close()\n\nThis issue was discovered during a code audit.\n\nAfter cancel_work_sync() is called from espintcp_close(),\nespintcp_tx_work() can still be scheduled from paths such as\nthe Delayed ACK handler or ksoftirqd.\nAs a result, the espintcp_tx_work() worker may dereference a\nfreed espintcp ctx or sk.\n\nThe following is a simple race scenario:\n\n cpu0 cpu1\n\n espintcp_close()\n cancel_work_sync(\u0026ctx-\u003ework);\n espintcp_write_space()\n schedule_work(\u0026ctx-\u003ework);\n\nTo prevent this race condition, cancel_work_sync() is\nreplaced with disable_work_sync().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23239",
"url": "https://www.suse.com/security/cve/CVE-2026-23239"
},
{
"category": "external",
"summary": "SUSE Bug 1259485 for CVE-2026-23239",
"url": "https://bugzilla.suse.com/1259485"
},
{
"category": "external",
"summary": "SUSE Bug 1262405 for CVE-2026-23239",
"url": "https://bugzilla.suse.com/1262405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "important"
}
],
"title": "CVE-2026-23239"
},
{
"cve": "CVE-2026-23240",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23240"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Fix race condition in tls_sw_cancel_work_tx()\n\nThis issue was discovered during a code audit.\n\nAfter cancel_delayed_work_sync() is called from tls_sk_proto_close(),\ntx_work_handler() can still be scheduled from paths such as the\nDelayed ACK handler or ksoftirqd.\nAs a result, the tx_work_handler() worker may dereference a freed\nTLS object.\n\nThe following is a simple race scenario:\n\n cpu0 cpu1\n\ntls_sk_proto_close()\n tls_sw_cancel_work_tx()\n tls_write_space()\n tls_sw_write_space()\n if (!test_and_set_bit(BIT_TX_SCHEDULED, \u0026tx_ctx-\u003etx_bitmask))\n set_bit(BIT_TX_SCHEDULED, \u0026ctx-\u003etx_bitmask);\n cancel_delayed_work_sync(\u0026ctx-\u003etx_work.work);\n schedule_delayed_work(\u0026tx_ctx-\u003etx_work.work, 0);\n\nTo prevent this race condition, cancel_delayed_work_sync() is\nreplaced with disable_delayed_work_sync().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23240",
"url": "https://www.suse.com/security/cve/CVE-2026-23240"
},
{
"category": "external",
"summary": "SUSE Bug 1259484 for CVE-2026-23240",
"url": "https://bugzilla.suse.com/1259484"
},
{
"category": "external",
"summary": "SUSE Bug 1262404 for CVE-2026-23240",
"url": "https://bugzilla.suse.com/1262404"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "important"
}
],
"title": "CVE-2026-23240"
},
{
"cve": "CVE-2026-23242",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23242"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/siw: Fix potential NULL pointer dereference in header processing\n\nIf siw_get_hdr() returns -EINVAL before set_rx_fpdu_context(),\nqp-\u003erx_fpdu can be NULL. The error path in siw_tcp_rx_data()\ndereferences qp-\u003erx_fpdu-\u003emore_ddp_segs without checking, which\nmay lead to a NULL pointer deref. Only check more_ddp_segs when\nrx_fpdu is present.\n\nKASAN splat:\n[ 101.384271] KASAN: null-ptr-deref in range [0x00000000000000c0-0x00000000000000c7]\n[ 101.385869] RIP: 0010:siw_tcp_rx_data+0x13ad/0x1e50",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23242",
"url": "https://www.suse.com/security/cve/CVE-2026-23242"
},
{
"category": "external",
"summary": "SUSE Bug 1259795 for CVE-2026-23242",
"url": "https://bugzilla.suse.com/1259795"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23242"
},
{
"cve": "CVE-2026-23243",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23243"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/umad: Reject negative data_len in ib_umad_write\n\nib_umad_write computes data_len from user-controlled count and the\nMAD header sizes. With a mismatched user MAD header size and RMPP\nheader length, data_len can become negative and reach ib_create_send_mad().\nThis can make the padding calculation exceed the segment size and trigger\nan out-of-bounds memset in alloc_send_rmpp_list().\n\nAdd an explicit check to reject negative data_len before creating the\nsend buffer.\n\nKASAN splat:\n[ 211.363464] BUG: KASAN: slab-out-of-bounds in ib_create_send_mad+0xa01/0x11b0\n[ 211.364077] Write of size 220 at addr ffff88800c3fa1f8 by task spray_thread/102\n[ 211.365867] ib_create_send_mad+0xa01/0x11b0\n[ 211.365887] ib_umad_write+0x853/0x1c80",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23243",
"url": "https://www.suse.com/security/cve/CVE-2026-23243"
},
{
"category": "external",
"summary": "SUSE Bug 1259797 for CVE-2026-23243",
"url": "https://bugzilla.suse.com/1259797"
},
{
"category": "external",
"summary": "SUSE Bug 1259798 for CVE-2026-23243",
"url": "https://bugzilla.suse.com/1259798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "important"
}
],
"title": "CVE-2026-23243"
},
{
"cve": "CVE-2026-23255",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23255"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: add proper RCU protection to /proc/net/ptype\n\nYin Fengwei reported an RCU stall in ptype_seq_show() and provided\na patch.\n\nReal issue is that ptype_seq_next() and ptype_seq_show() violate\nRCU rules.\n\nptype_seq_show() runs under rcu_read_lock(), and reads pt-\u003edev\nto get device name without any barrier.\n\nAt the same time, concurrent writers can remove a packet_type structure\n(which is correctly freed after an RCU grace period) and clear pt-\u003edev\nwithout an RCU grace period.\n\nDefine ptype_iter_state to carry a dev pointer along seq_net_private:\n\nstruct ptype_iter_state {\n\tstruct seq_net_private\tp;\n\tstruct net_device\t*dev; // added in this patch\n};\n\nWe need to record the device pointer in ptype_get_idx() and\nptype_seq_next() so that ptype_seq_show() is safe against\nconcurrent pt-\u003edev changes.\n\nWe also need to add full RCU protection in ptype_seq_next().\n(Missing READ_ONCE() when reading list.next values)\n\nMany thanks to Dong Chenchen for providing a repro.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23255",
"url": "https://www.suse.com/security/cve/CVE-2026-23255"
},
{
"category": "external",
"summary": "SUSE Bug 1259891 for CVE-2026-23255",
"url": "https://bugzilla.suse.com/1259891"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23255"
},
{
"cve": "CVE-2026-23262",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23262"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngve: Fix stats report corruption on queue count change\n\nThe driver and the NIC share a region in memory for stats reporting.\nThe NIC calculates its offset into this region based on the total size\nof the stats region and the size of the NIC\u0027s stats.\n\nWhen the number of queues is changed, the driver\u0027s stats region is\nresized. If the queue count is increased, the NIC can write past\nthe end of the allocated stats region, causing memory corruption.\nIf the queue count is decreased, there is a gap between the driver\nand NIC stats, leading to incorrect stats reporting.\n\nThis change fixes the issue by allocating stats region with maximum\nsize, and the offset calculation for NIC stats is changed to match\nwith the calculation of the NIC.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23262",
"url": "https://www.suse.com/security/cve/CVE-2026-23262"
},
{
"category": "external",
"summary": "SUSE Bug 1259870 for CVE-2026-23262",
"url": "https://bugzilla.suse.com/1259870"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23262"
},
{
"cve": "CVE-2026-23270",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23270"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks\n\nAs Paolo said earlier [1]:\n\n\"Since the blamed commit below, classify can return TC_ACT_CONSUMED while\nthe current skb being held by the defragmentation engine. As reported by\nGangMin Kim, if such packet is that may cause a UaF when the defrag engine\nlater on tries to tuch again such packet.\"\n\nact_ct was never meant to be used in the egress path, however some users\nare attaching it to egress today [2]. Attempting to reach a middle\nground, we noticed that, while most qdiscs are not handling\nTC_ACT_CONSUMED, clsact/ingress qdiscs are. With that in mind, we\naddress the issue by only allowing act_ct to bind to clsact/ingress\nqdiscs and shared blocks. That way it\u0027s still possible to attach act_ct to\negress (albeit only with clsact).\n\n[1] https://lore.kernel.org/netdev/674b8cbfc385c6f37fb29a1de08d8fe5c2b0fbee.1771321118.git.pabeni@redhat.com/\n[2] https://lore.kernel.org/netdev/cc6bfb4a-4a2b-42d8-b9ce-7ef6644fb22b@ovn.org/",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23270",
"url": "https://www.suse.com/security/cve/CVE-2026-23270"
},
{
"category": "external",
"summary": "SUSE Bug 1259886 for CVE-2026-23270",
"url": "https://bugzilla.suse.com/1259886"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23270"
},
{
"cve": "CVE-2026-23272",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23272"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: unconditionally bump set-\u003enelems before insertion\n\nIn case that the set is full, a new element gets published then removed\nwithout waiting for the RCU grace period, while RCU reader can be\nwalking over it already.\n\nTo address this issue, add the element transaction even if set is full,\nbut toggle the set_full flag to report -ENFILE so the abort path safely\nunwinds the set to its previous state.\n\nAs for element updates, decrement set-\u003enelems to restore it.\n\nA simpler fix is to call synchronize_rcu() in the error path.\nHowever, with a large batch adding elements to already maxed-out set,\nthis could cause noticeable slowdown of such batches.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23272",
"url": "https://www.suse.com/security/cve/CVE-2026-23272"
},
{
"category": "external",
"summary": "SUSE Bug 1260009 for CVE-2026-23272",
"url": "https://bugzilla.suse.com/1260009"
},
{
"category": "external",
"summary": "SUSE Bug 1260909 for CVE-2026-23272",
"url": "https://bugzilla.suse.com/1260909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "important"
}
],
"title": "CVE-2026-23272"
},
{
"cve": "CVE-2026-23274",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23274"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels\n\nIDLETIMER revision 0 rules reuse existing timers by label and always call\nmod_timer() on timer-\u003etimer.\n\nIf the label was created first by revision 1 with XT_IDLETIMER_ALARM,\nthe object uses alarm timer semantics and timer-\u003etimer is never initialized.\nReusing that object from revision 0 causes mod_timer() on an uninitialized\ntimer_list, triggering debugobjects warnings and possible panic when\npanic_on_warn=1.\n\nFix this by rejecting revision 0 rule insertion when an existing timer with\nthe same label is of ALARM type.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23274",
"url": "https://www.suse.com/security/cve/CVE-2026-23274"
},
{
"category": "external",
"summary": "SUSE Bug 1260005 for CVE-2026-23274",
"url": "https://bugzilla.suse.com/1260005"
},
{
"category": "external",
"summary": "SUSE Bug 1260908 for CVE-2026-23274",
"url": "https://bugzilla.suse.com/1260908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "important"
}
],
"title": "CVE-2026-23274"
},
{
"cve": "CVE-2026-23277",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23277"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit\n\nteql_master_xmit() calls netdev_start_xmit(skb, slave) to transmit\nthrough slave devices, but does not update skb-\u003edev to the slave device\nbeforehand.\n\nWhen a gretap tunnel is a TEQL slave, the transmit path reaches\niptunnel_xmit() which saves dev = skb-\u003edev (still pointing to teql0\nmaster) and later calls iptunnel_xmit_stats(dev, pkt_len). This\nfunction does:\n\n get_cpu_ptr(dev-\u003etstats)\n\nSince teql_master_setup() does not set dev-\u003epcpu_stat_type to\nNETDEV_PCPU_STAT_TSTATS, the core network stack never allocates tstats\nfor teql0, so dev-\u003etstats is NULL. get_cpu_ptr(NULL) computes\nNULL + __per_cpu_offset[cpu], resulting in a page fault.\n\n BUG: unable to handle page fault for address: ffff8880e6659018\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD 68bc067 P4D 68bc067 PUD 0\n Oops: Oops: 0002 [#1] SMP KASAN PTI\n RIP: 0010:iptunnel_xmit (./include/net/ip_tunnels.h:664 net/ipv4/ip_tunnel_core.c:89)\n Call Trace:\n \u003cTASK\u003e\n ip_tunnel_xmit (net/ipv4/ip_tunnel.c:847)\n __gre_xmit (net/ipv4/ip_gre.c:478)\n gre_tap_xmit (net/ipv4/ip_gre.c:779)\n teql_master_xmit (net/sched/sch_teql.c:319)\n dev_hard_start_xmit (net/core/dev.c:3887)\n sch_direct_xmit (net/sched/sch_generic.c:347)\n __dev_queue_xmit (net/core/dev.c:4802)\n neigh_direct_output (net/core/neighbour.c:1660)\n ip_finish_output2 (net/ipv4/ip_output.c:237)\n __ip_finish_output.part.0 (net/ipv4/ip_output.c:315)\n ip_mc_output (net/ipv4/ip_output.c:369)\n ip_send_skb (net/ipv4/ip_output.c:1508)\n udp_send_skb (net/ipv4/udp.c:1195)\n udp_sendmsg (net/ipv4/udp.c:1485)\n inet_sendmsg (net/ipv4/af_inet.c:859)\n __sys_sendto (net/socket.c:2206)\n\nFix this by setting skb-\u003edev = slave before calling\nnetdev_start_xmit(), so that tunnel xmit functions see the correct\nslave device with properly allocated tstats.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23277",
"url": "https://www.suse.com/security/cve/CVE-2026-23277"
},
{
"category": "external",
"summary": "SUSE Bug 1259997 for CVE-2026-23277",
"url": "https://bugzilla.suse.com/1259997"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23277"
},
{
"cve": "CVE-2026-23278",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23278"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: always walk all pending catchall elements\n\nDuring transaction processing we might have more than one catchall element:\n1 live catchall element and 1 pending element that is coming as part of the\nnew batch.\n\nIf the map holding the catchall elements is also going away, its\nrequired to toggle all catchall elements and not just the first viable\ncandidate.\n\nOtherwise, we get:\n WARNING: ./include/net/netfilter/nf_tables.h:1281 at nft_data_release+0xb7/0xe0 [nf_tables], CPU#2: nft/1404\n RIP: 0010:nft_data_release+0xb7/0xe0 [nf_tables]\n [..]\n __nft_set_elem_destroy+0x106/0x380 [nf_tables]\n nf_tables_abort_release+0x348/0x8d0 [nf_tables]\n nf_tables_abort+0xcf2/0x3ac0 [nf_tables]\n nfnetlink_rcv_batch+0x9c9/0x20e0 [..]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23278",
"url": "https://www.suse.com/security/cve/CVE-2026-23278"
},
{
"category": "external",
"summary": "SUSE Bug 1259998 for CVE-2026-23278",
"url": "https://bugzilla.suse.com/1259998"
},
{
"category": "external",
"summary": "SUSE Bug 1260907 for CVE-2026-23278",
"url": "https://bugzilla.suse.com/1260907"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "important"
}
],
"title": "CVE-2026-23278"
},
{
"cve": "CVE-2026-23281",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23281"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: libertas: fix use-after-free in lbs_free_adapter()\n\nThe lbs_free_adapter() function uses timer_delete() (non-synchronous)\nfor both command_timer and tx_lockup_timer before the structure is\nfreed. This is incorrect because timer_delete() does not wait for\nany running timer callback to complete.\n\nIf a timer callback is executing when lbs_free_adapter() is called,\nthe callback will access freed memory since lbs_cfg_free() frees the\ncontaining structure immediately after lbs_free_adapter() returns.\n\nBoth timer callbacks (lbs_cmd_timeout_handler and lbs_tx_lockup_handler)\naccess priv-\u003edriver_lock, priv-\u003ecur_cmd, priv-\u003edev, and other fields,\nwhich would all be use-after-free violations.\n\nUse timer_delete_sync() instead to ensure any running timer callback\nhas completed before returning.\n\nThis bug was introduced in commit 8f641d93c38a (\"libertas: detect TX\nlockups and reset hardware\") where del_timer() was used instead of\ndel_timer_sync() in the cleanup path. The command_timer has had the\nsame issue since the driver was first written.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23281",
"url": "https://www.suse.com/security/cve/CVE-2026-23281"
},
{
"category": "external",
"summary": "SUSE Bug 1260464 for CVE-2026-23281",
"url": "https://bugzilla.suse.com/1260464"
},
{
"category": "external",
"summary": "SUSE Bug 1260466 for CVE-2026-23281",
"url": "https://bugzilla.suse.com/1260466"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23281"
},
{
"cve": "CVE-2026-23292",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23292"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: Fix recursive locking in __configfs_open_file()\n\nIn flush_write_buffer, \u0026p-\u003efrag_sem is acquired and then the loaded store\nfunction is called, which, here, is target_core_item_dbroot_store(). This\nfunction called filp_open(), following which these functions were called\n(in reverse order), according to the call trace:\n\n down_read\n __configfs_open_file\n do_dentry_open\n vfs_open\n do_open\n path_openat\n do_filp_open\n file_open_name\n filp_open\n target_core_item_dbroot_store\n flush_write_buffer\n configfs_write_iter\n\ntarget_core_item_dbroot_store() tries to validate the new file path by\ntrying to open the file path provided to it; however, in this case, the bug\nreport shows:\n\ndb_root: not a directory: /sys/kernel/config/target/dbroot\n\nindicating that the same configfs file was tried to be opened, on which it\nis currently working on. Thus, it is trying to acquire frag_sem semaphore\nof the same file of which it already holds the semaphore obtained in\nflush_write_buffer(), leading to acquiring the semaphore in a nested manner\nand a possibility of recursive locking.\n\nFix this by modifying target_core_item_dbroot_store() to use kern_path()\ninstead of filp_open() to avoid opening the file using filesystem-specific\nfunction __configfs_open_file(), and further modifying it to make this fix\ncompatible.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23292",
"url": "https://www.suse.com/security/cve/CVE-2026-23292"
},
{
"category": "external",
"summary": "SUSE Bug 1260500 for CVE-2026-23292",
"url": "https://bugzilla.suse.com/1260500"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23292"
},
{
"cve": "CVE-2026-23293",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23293"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled\n\nWhen booting with the \u0027ipv6.disable=1\u0027 parameter, the nd_tbl is never\ninitialized because inet6_init() exits before ndisc_init() is called\nwhich initializes it. If an IPv6 packet is injected into the interface,\nroute_shortcircuit() is called and a NULL pointer dereference happens on\nneigh_lookup().\n\n BUG: kernel NULL pointer dereference, address: 0000000000000380\n Oops: Oops: 0000 [#1] SMP NOPTI\n [...]\n RIP: 0010:neigh_lookup+0x20/0x270\n [...]\n Call Trace:\n \u003cTASK\u003e\n vxlan_xmit+0x638/0x1ef0 [vxlan]\n dev_hard_start_xmit+0x9e/0x2e0\n __dev_queue_xmit+0xbee/0x14e0\n packet_sendmsg+0x116f/0x1930\n __sys_sendto+0x1f5/0x200\n __x64_sys_sendto+0x24/0x30\n do_syscall_64+0x12f/0x1590\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFix this by adding an early check on route_shortcircuit() when protocol\nis ETH_P_IPV6. Note that ipv6_mod_enabled() cannot be used here because\nVXLAN can be built-in even when IPv6 is built as a module.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23293",
"url": "https://www.suse.com/security/cve/CVE-2026-23293"
},
{
"category": "external",
"summary": "SUSE Bug 1260486 for CVE-2026-23293",
"url": "https://bugzilla.suse.com/1260486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23293"
},
{
"cve": "CVE-2026-23297",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23297"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: Fix cred ref leak in nfsd_nl_threads_set_doit().\n\nsyzbot reported memory leak of struct cred. [0]\n\nnfsd_nl_threads_set_doit() passes get_current_cred() to\nnfsd_svc(), but put_cred() is not called after that.\n\nThe cred is finally passed down to _svc_xprt_create(),\nwhich calls get_cred() with the cred for struct svc_xprt.\n\nThe ownership of the refcount by get_current_cred() is not\ntransferred to anywhere and is just leaked.\n\nnfsd_svc() is also called from write_threads(), but it does\nnot bump file-\u003ef_cred there.\n\nnfsd_nl_threads_set_doit() is called from sendmsg() and\ncurrent-\u003ecred does not go away.\n\nLet\u0027s use current_cred() in nfsd_nl_threads_set_doit().\n\n[0]:\nBUG: memory leak\nunreferenced object 0xffff888108b89480 (size 184):\n comm \"syz-executor\", pid 5994, jiffies 4294943386\n hex dump (first 32 bytes):\n 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc 369454a7):\n kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]\n slab_post_alloc_hook mm/slub.c:4958 [inline]\n slab_alloc_node mm/slub.c:5263 [inline]\n kmem_cache_alloc_noprof+0x412/0x580 mm/slub.c:5270\n prepare_creds+0x22/0x600 kernel/cred.c:185\n copy_creds+0x44/0x290 kernel/cred.c:286\n copy_process+0x7a7/0x2870 kernel/fork.c:2086\n kernel_clone+0xac/0x6e0 kernel/fork.c:2651\n __do_sys_clone+0x7f/0xb0 kernel/fork.c:2792\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23297",
"url": "https://www.suse.com/security/cve/CVE-2026-23297"
},
{
"category": "external",
"summary": "SUSE Bug 1260490 for CVE-2026-23297",
"url": "https://bugzilla.suse.com/1260490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23297"
},
{
"cve": "CVE-2026-23304",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23304"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu()\n\nl3mdev_master_dev_rcu() can return NULL when the slave device is being\nun-slaved from a VRF. All other callers deal with this, but we lost\nthe fallback to loopback in ip6_rt_pcpu_alloc() -\u003e ip6_rt_get_dev_rcu()\nwith commit 4832c30d5458 (\"net: ipv6: put host and anycast routes on\ndevice with address\").\n\n KASAN: null-ptr-deref in range [0x0000000000000108-0x000000000000010f]\n RIP: 0010:ip6_rt_pcpu_alloc (net/ipv6/route.c:1418)\n Call Trace:\n ip6_pol_route (net/ipv6/route.c:2318)\n fib6_rule_lookup (net/ipv6/fib6_rules.c:115)\n ip6_route_output_flags (net/ipv6/route.c:2607)\n vrf_process_v6_outbound (drivers/net/vrf.c:437)\n\nI was tempted to rework the un-slaving code to clear the flag first\nand insert synchronize_rcu() before we remove the upper. But looks like\nthe explicit fallback to loopback_dev is an established pattern.\nAnd I guess avoiding the synchronize_rcu() is nice, too.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23304",
"url": "https://www.suse.com/security/cve/CVE-2026-23304"
},
{
"category": "external",
"summary": "SUSE Bug 1260544 for CVE-2026-23304",
"url": "https://bugzilla.suse.com/1260544"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23304"
},
{
"cve": "CVE-2026-23319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23319"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix a UAF issue in bpf_trampoline_link_cgroup_shim\n\nThe root cause of this bug is that when \u0027bpf_link_put\u0027 reduces the\nrefcount of \u0027shim_link-\u003elink.link\u0027 to zero, the resource is considered\nreleased but may still be referenced via \u0027tr-\u003eprogs_hlist\u0027 in\n\u0027cgroup_shim_find\u0027. The actual cleanup of \u0027tr-\u003eprogs_hlist\u0027 in\n\u0027bpf_shim_tramp_link_release\u0027 is deferred. During this window, another\nprocess can cause a use-after-free via \u0027bpf_trampoline_link_cgroup_shim\u0027.\n\nBased on Martin KaFai Lau\u0027s suggestions, I have created a simple patch.\n\nTo fix this:\n Add an atomic non-zero check in \u0027bpf_trampoline_link_cgroup_shim\u0027.\n Only increment the refcount if it is not already zero.\n\nTesting:\n I verified the fix by adding a delay in\n \u0027bpf_shim_tramp_link_release\u0027 to make the bug easier to trigger:\n\nstatic void bpf_shim_tramp_link_release(struct bpf_link *link)\n{\n\t/* ... */\n\tif (!shim_link-\u003etrampoline)\n\t\treturn;\n\n+\tmsleep(100);\n\tWARN_ON_ONCE(bpf_trampoline_unlink_prog(\u0026shim_link-\u003elink,\n\t\tshim_link-\u003etrampoline, NULL));\n\tbpf_trampoline_put(shim_link-\u003etrampoline);\n}\n\nBefore the patch, running a PoC easily reproduced the crash(almost 100%)\nwith a call trace similar to KaiyanM\u0027s report.\nAfter the patch, the bug no longer occurs even after millions of\niterations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23319",
"url": "https://www.suse.com/security/cve/CVE-2026-23319"
},
{
"category": "external",
"summary": "SUSE Bug 1260735 for CVE-2026-23319",
"url": "https://bugzilla.suse.com/1260735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23319"
},
{
"cve": "CVE-2026-23326",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23326"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: Fix fragment node deletion to prevent buffer leak\n\nAfter commit b692bf9a7543 (\"xsk: Get rid of xdp_buff_xsk::xskb_list_node\"),\nthe list_node field is reused for both the xskb pool list and the buffer\nfree list, this causes a buffer leak as described below.\n\nxp_free() checks if a buffer is already on the free list using\nlist_empty(\u0026xskb-\u003elist_node). When list_del() is used to remove a node\nfrom the xskb pool list, it doesn\u0027t reinitialize the node pointers.\nThis means list_empty() will return false even after the node has been\nremoved, causing xp_free() to incorrectly skip adding the buffer to the\nfree list.\n\nFix this by using list_del_init() instead of list_del() in all fragment\nhandling paths, this ensures the list node is reinitialized after removal,\nallowing the list_empty() to work correctly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23326",
"url": "https://www.suse.com/security/cve/CVE-2026-23326"
},
{
"category": "external",
"summary": "SUSE Bug 1260606 for CVE-2026-23326",
"url": "https://bugzilla.suse.com/1260606"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23326"
},
{
"cve": "CVE-2026-23335",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23335"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix kernel stack leak in irdma_create_user_ah()\n\nstruct irdma_create_ah_resp { // 8 bytes, no padding\n __u32 ah_id; // offset 0 - SET (uresp.ah_id = ah-\u003esc_ah.ah_info.ah_idx)\n __u8 rsvd[4]; // offset 4 - NEVER SET \u003c- LEAK\n};\n\nrsvd[4]: 4 bytes of stack memory leaked unconditionally. Only ah_id is assigned before ib_respond_udata().\n\nThe reserved members of the structure were not zeroed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23335",
"url": "https://www.suse.com/security/cve/CVE-2026-23335"
},
{
"category": "external",
"summary": "SUSE Bug 1260550 for CVE-2026-23335",
"url": "https://bugzilla.suse.com/1260550"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "low"
}
],
"title": "CVE-2026-23335"
},
{
"cve": "CVE-2026-23343",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23343"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxdp: produce a warning when calculated tailroom is negative\n\nMany ethernet drivers report xdp Rx queue frag size as being the same as\nDMA write size. However, the only user of this field, namely\nbpf_xdp_frags_increase_tail(), clearly expects a truesize.\n\nSuch difference leads to unspecific memory corruption issues under certain\ncircumstances, e.g. in ixgbevf maximum DMA write size is 3 KB, so when\nrunning xskxceiver\u0027s XDP_ADJUST_TAIL_GROW_MULTI_BUFF, 6K packet fully uses\nall DMA-writable space in 2 buffers. This would be fine, if only\nrxq-\u003efrag_size was properly set to 4K, but value of 3K results in a\nnegative tailroom, because there is a non-zero page offset.\n\nWe are supposed to return -EINVAL and be done with it in such case, but due\nto tailroom being stored as an unsigned int, it is reported to be somewhere\nnear UINT_MAX, resulting in a tail being grown, even if the requested\noffset is too much (it is around 2K in the abovementioned test). This later\nleads to all kinds of unspecific calltraces.\n\n[ 7340.337579] xskxceiver[1440]: segfault at 1da718 ip 00007f4161aeac9d sp 00007f41615a6a00 error 6\n[ 7340.338040] xskxceiver[1441]: segfault at 7f410000000b ip 00000000004042b5 sp 00007f415bffecf0 error 4\n[ 7340.338179] in libc.so.6[61c9d,7f4161aaf000+160000]\n[ 7340.339230] in xskxceiver[42b5,400000+69000]\n[ 7340.340300] likely on CPU 6 (core 0, socket 6)\n[ 7340.340302] Code: ff ff 01 e9 f4 fe ff ff 0f 1f 44 00 00 4c 39 f0 74 73 31 c0 ba 01 00 00 00 f0 0f b1 17 0f 85 ba 00 00 00 49 8b 87 88 00 00 00 \u003c4c\u003e 89 70 08 eb cc 0f 1f 44 00 00 48 8d bd f0 fe ff ff 89 85 ec fe\n[ 7340.340888] likely on CPU 3 (core 0, socket 3)\n[ 7340.345088] Code: 00 00 00 ba 00 00 00 00 be 00 00 00 00 89 c7 e8 31 ca ff ff 89 45 ec 8b 45 ec 85 c0 78 07 b8 00 00 00 00 eb 46 e8 0b c8 ff ff \u003c8b\u003e 00 83 f8 69 74 24 e8 ff c7 ff ff 8b 00 83 f8 0b 74 18 e8 f3 c7\n[ 7340.404334] Oops: general protection fault, probably for non-canonical address 0x6d255010bdffc: 0000 [#1] SMP NOPTI\n[ 7340.405972] CPU: 7 UID: 0 PID: 1439 Comm: xskxceiver Not tainted 6.19.0-rc1+ #21 PREEMPT(lazy)\n[ 7340.408006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-5.fc42 04/01/2014\n[ 7340.409716] RIP: 0010:lookup_swap_cgroup_id+0x44/0x80\n[ 7340.410455] Code: 83 f8 1c 73 39 48 ba ff ff ff ff ff ff ff 03 48 8b 04 c5 20 55 fa bd 48 21 d1 48 89 ca 83 e1 01 48 d1 ea c1 e1 04 48 8d 04 90 \u003c8b\u003e 00 48 83 c4 10 d3 e8 c3 cc cc cc cc 31 c0 e9 98 b7 dd 00 48 89\n[ 7340.412787] RSP: 0018:ffffcc5c04f7f6d0 EFLAGS: 00010202\n[ 7340.413494] RAX: 0006d255010bdffc RBX: ffff891f477895a8 RCX: 0000000000000010\n[ 7340.414431] RDX: 0001c17e3fffffff RSI: 00fa070000000000 RDI: 000382fc7fffffff\n[ 7340.415354] RBP: 00fa070000000000 R08: ffffcc5c04f7f8f8 R09: ffffcc5c04f7f7d0\n[ 7340.416283] R10: ffff891f4c1a7000 R11: ffffcc5c04f7f9c8 R12: ffffcc5c04f7f7d0\n[ 7340.417218] R13: 03ffffffffffffff R14: 00fa06fffffffe00 R15: ffff891f47789500\n[ 7340.418229] FS: 0000000000000000(0000) GS:ffff891ffdfaa000(0000) knlGS:0000000000000000\n[ 7340.419489] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 7340.420286] CR2: 00007f415bfffd58 CR3: 0000000103f03002 CR4: 0000000000772ef0\n[ 7340.421237] PKRU: 55555554\n[ 7340.421623] Call Trace:\n[ 7340.421987] \u003cTASK\u003e\n[ 7340.422309] ? softleaf_from_pte+0x77/0xa0\n[ 7340.422855] swap_pte_batch+0xa7/0x290\n[ 7340.423363] zap_nonpresent_ptes.constprop.0.isra.0+0xd1/0x270\n[ 7340.424102] zap_pte_range+0x281/0x580\n[ 7340.424607] zap_pmd_range.isra.0+0xc9/0x240\n[ 7340.425177] unmap_page_range+0x24d/0x420\n[ 7340.425714] unmap_vmas+0xa1/0x180\n[ 7340.426185] exit_mmap+0xe1/0x3b0\n[ 7340.426644] __mmput+0x41/0x150\n[ 7340.427098] exit_mm+0xb1/0x110\n[ 7340.427539] do_exit+0x1b2/0x460\n[ 7340.427992] do_group_exit+0x2d/0xc0\n[ 7340.428477] get_signal+0x79d/0x7e0\n[ 7340.428957] arch_do_signal_or_restart+0x34/0x100\n[ 7340.429571] exit_to_user_mode_loop+0x8e/0x4c0\n[ 7340.430159] do_syscall_64+0x188/\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23343",
"url": "https://www.suse.com/security/cve/CVE-2026-23343"
},
{
"category": "external",
"summary": "SUSE Bug 1260527 for CVE-2026-23343",
"url": "https://bugzilla.suse.com/1260527"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23343"
},
{
"cve": "CVE-2026-23361",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23361"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry\n\nEndpoint drivers use dw_pcie_ep_raise_msix_irq() to raise an MSI-X\ninterrupt to the host using a writel(), which generates a PCI posted write\ntransaction. There\u0027s no completion for posted writes, so the writel() may\nreturn before the PCI write completes. dw_pcie_ep_raise_msix_irq() also\nunmaps the outbound ATU entry used for the PCI write, so the write races\nwith the unmap.\n\nIf the PCI write loses the race with the ATU unmap, the write may corrupt\nhost memory or cause IOMMU errors, e.g., these when running fio with a\nlarger queue depth against nvmet-pci-epf:\n\n arm-smmu-v3 fc900000.iommu: 0x0000010000000010\n arm-smmu-v3 fc900000.iommu: 0x0000020000000000\n arm-smmu-v3 fc900000.iommu: 0x000000090000f040\n arm-smmu-v3 fc900000.iommu: 0x0000000000000000\n arm-smmu-v3 fc900000.iommu: event: F_TRANSLATION client: 0000:01:00.0 sid: 0x100 ssid: 0x0 iova: 0x90000f040 ipa: 0x0\n arm-smmu-v3 fc900000.iommu: unpriv data write s1 \"Input address caused fault\" stag: 0x0\n\nFlush the write by performing a readl() of the same address to ensure that\nthe write has reached the destination before the ATU entry is unmapped.\n\nThe same problem was solved for dw_pcie_ep_raise_msi_irq() in commit\n8719c64e76bf (\"PCI: dwc: ep: Cache MSI outbound iATU mapping\"), but there\nit was solved by dedicating an outbound iATU only for MSI. We can\u0027t do the\nsame for MSI-X because each vector can have a different msg_addr and the\nmsg_addr may be changed while the vector is masked.\n\n[bhelgaas: commit log]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23361",
"url": "https://www.suse.com/security/cve/CVE-2026-23361"
},
{
"category": "external",
"summary": "SUSE Bug 1260732 for CVE-2026-23361",
"url": "https://bugzilla.suse.com/1260732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23361"
},
{
"cve": "CVE-2026-23379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23379"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: ets: fix divide by zero in the offload path\n\nOffloading ETS requires computing each class\u0027 WRR weight: this is done by\naveraging over the sums of quanta as \u0027q_sum\u0027 and \u0027q_psum\u0027. Using unsigned\nint, the same integer size as the individual DRR quanta, can overflow and\neven cause division by zero, like it happened in the following splat:\n\n Oops: divide error: 0000 [#1] SMP PTI\n CPU: 13 UID: 0 PID: 487 Comm: tc Tainted: G E 6.19.0-virtme #45 PREEMPT(full)\n Tainted: [E]=UNSIGNED_MODULE\n Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011\n RIP: 0010:ets_offload_change+0x11f/0x290 [sch_ets]\n Code: e4 45 31 ff eb 03 41 89 c7 41 89 cb 89 ce 83 f9 0f 0f 87 b7 00 00 00 45 8b 08 31 c0 45 01 cc 45 85 c9 74 09 41 6b c4 64 31 d2 \u003c41\u003e f7 f2 89 c2 44 29 fa 45 89 df 41 83 fb 0f 0f 87 c7 00 00 00 44\n RSP: 0018:ffffd0a180d77588 EFLAGS: 00010246\n RAX: 00000000ffffff38 RBX: ffff8d3d482ca000 RCX: 0000000000000000\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffd0a180d77660\n RBP: ffffd0a180d77690 R08: ffff8d3d482ca2d8 R09: 00000000fffffffe\n R10: 0000000000000000 R11: 0000000000000000 R12: 00000000fffffffe\n R13: ffff8d3d472f2000 R14: 0000000000000003 R15: 0000000000000000\n FS: 00007f440b6c2740(0000) GS:ffff8d3dc9803000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000000003cdd2000 CR3: 0000000007b58002 CR4: 0000000000172ef0\n Call Trace:\n \u003cTASK\u003e\n ets_qdisc_change+0x870/0xf40 [sch_ets]\n qdisc_create+0x12b/0x540\n tc_modify_qdisc+0x6d7/0xbd0\n rtnetlink_rcv_msg+0x168/0x6b0\n netlink_rcv_skb+0x5c/0x110\n netlink_unicast+0x1d6/0x2b0\n netlink_sendmsg+0x22e/0x470\n ____sys_sendmsg+0x38a/0x3c0\n ___sys_sendmsg+0x99/0xe0\n __sys_sendmsg+0x8a/0xf0\n do_syscall_64+0x111/0xf80\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n RIP: 0033:0x7f440b81c77e\n Code: 4d 89 d8 e8 d4 bc 00 00 4c 8b 5d f8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 11 c9 c3 0f 1f 80 00 00 00 00 48 8b 45 10 0f 05 \u003cc9\u003e c3 83 e2 39 83 fa 08 75 e7 e8 13 ff ff ff 0f 1f 00 f3 0f 1e fa\n RSP: 002b:00007fff951e4c10 EFLAGS: 00000202 ORIG_RAX: 000000000000002e\n RAX: ffffffffffffffda RBX: 0000000000481820 RCX: 00007f440b81c77e\n RDX: 0000000000000000 RSI: 00007fff951e4cd0 RDI: 0000000000000003\n RBP: 00007fff951e4c20 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000202 R12: 00007fff951f4fa8\n R13: 00000000699ddede R14: 00007f440bb01000 R15: 0000000000486980\n \u003c/TASK\u003e\n Modules linked in: sch_ets(E) netdevsim(E)\n ---[ end trace 0000000000000000 ]---\n RIP: 0010:ets_offload_change+0x11f/0x290 [sch_ets]\n Code: e4 45 31 ff eb 03 41 89 c7 41 89 cb 89 ce 83 f9 0f 0f 87 b7 00 00 00 45 8b 08 31 c0 45 01 cc 45 85 c9 74 09 41 6b c4 64 31 d2 \u003c41\u003e f7 f2 89 c2 44 29 fa 45 89 df 41 83 fb 0f 0f 87 c7 00 00 00 44\n RSP: 0018:ffffd0a180d77588 EFLAGS: 00010246\n RAX: 00000000ffffff38 RBX: ffff8d3d482ca000 RCX: 0000000000000000\n RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffd0a180d77660\n RBP: ffffd0a180d77690 R08: ffff8d3d482ca2d8 R09: 00000000fffffffe\n R10: 0000000000000000 R11: 0000000000000000 R12: 00000000fffffffe\n R13: ffff8d3d472f2000 R14: 0000000000000003 R15: 0000000000000000\n FS: 00007f440b6c2740(0000) GS:ffff8d3dc9803000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000000003cdd2000 CR3: 0000000007b58002 CR4: 0000000000172ef0\n Kernel panic - not syncing: Fatal exception\n Kernel Offset: 0x30000000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)\n ---[ end Kernel panic - not syncing: Fatal exception ]---\n\nFix this using 64-bit integers for \u0027q_sum\u0027 and \u0027q_psum\u0027.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23379",
"url": "https://www.suse.com/security/cve/CVE-2026-23379"
},
{
"category": "external",
"summary": "SUSE Bug 1260481 for CVE-2026-23379",
"url": "https://bugzilla.suse.com/1260481"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23379"
},
{
"cve": "CVE-2026-23381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23381"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: fix nd_tbl NULL dereference when IPv6 is disabled\n\nWhen booting with the \u0027ipv6.disable=1\u0027 parameter, the nd_tbl is never\ninitialized because inet6_init() exits before ndisc_init() is called\nwhich initializes it. Then, if neigh_suppress is enabled and an ICMPv6\nNeighbor Discovery packet reaches the bridge, br_do_suppress_nd() will\ndereference ipv6_stub-\u003end_tbl which is NULL, passing it to\nneigh_lookup(). This causes a kernel NULL pointer dereference.\n\n BUG: kernel NULL pointer dereference, address: 0000000000000268\n Oops: 0000 [#1] PREEMPT SMP NOPTI\n [...]\n RIP: 0010:neigh_lookup+0x16/0xe0\n [...]\n Call Trace:\n \u003cIRQ\u003e\n ? neigh_lookup+0x16/0xe0\n br_do_suppress_nd+0x160/0x290 [bridge]\n br_handle_frame_finish+0x500/0x620 [bridge]\n br_handle_frame+0x353/0x440 [bridge]\n __netif_receive_skb_core.constprop.0+0x298/0x1110\n __netif_receive_skb_one_core+0x3d/0xa0\n process_backlog+0xa0/0x140\n __napi_poll+0x2c/0x170\n net_rx_action+0x2c4/0x3a0\n handle_softirqs+0xd0/0x270\n do_softirq+0x3f/0x60\n\nFix this by replacing IS_ENABLED(IPV6) call with ipv6_mod_enabled() in\nthe callers. This is in essence disabling NS/NA suppression when IPv6 is\ndisabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23381",
"url": "https://www.suse.com/security/cve/CVE-2026-23381"
},
{
"category": "external",
"summary": "SUSE Bug 1260471 for CVE-2026-23381",
"url": "https://bugzilla.suse.com/1260471"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23381"
},
{
"cve": "CVE-2026-23383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23383"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing\n\nstruct bpf_plt contains a u64 target field. Currently, the BPF JIT\nallocator requests an alignment of 4 bytes (sizeof(u32)) for the JIT\nbuffer.\n\nBecause the base address of the JIT buffer can be 4-byte aligned (e.g.,\nending in 0x4 or 0xc), the relative padding logic in build_plt() fails\nto ensure that target lands on an 8-byte boundary.\n\nThis leads to two issues:\n1. UBSAN reports misaligned-access warnings when dereferencing the\n structure.\n2. More critically, target is updated concurrently via WRITE_ONCE() in\n bpf_arch_text_poke() while the JIT\u0027d code executes ldr. On arm64,\n 64-bit loads/stores are only guaranteed to be single-copy atomic if\n they are 64-bit aligned. A misaligned target risks a torn read,\n causing the JIT to jump to a corrupted address.\n\nFix this by increasing the allocation alignment requirement to 8 bytes\n(sizeof(u64)) in bpf_jit_binary_pack_alloc(). This anchors the base of\nthe JIT buffer to an 8-byte boundary, allowing the relative padding math\nin build_plt() to correctly align the target field.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23383",
"url": "https://www.suse.com/security/cve/CVE-2026-23383"
},
{
"category": "external",
"summary": "SUSE Bug 1260497 for CVE-2026-23383",
"url": "https://bugzilla.suse.com/1260497"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23383"
},
{
"cve": "CVE-2026-23386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23386"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL\n\nIn DQ-QPL mode, gve_tx_clean_pending_packets() incorrectly uses the RDA\nbuffer cleanup path. It iterates num_bufs times and attempts to unmap\nentries in the dma array.\n\nThis leads to two issues:\n1. The dma array shares storage with tx_qpl_buf_ids (union).\n Interpreting buffer IDs as DMA addresses results in attempting to\n unmap incorrect memory locations.\n2. num_bufs in QPL mode (counting 2K chunks) can significantly exceed\n the size of the dma array, causing out-of-bounds access warnings\n(trace below is how we noticed this issue).\n\nUBSAN: array-index-out-of-bounds in\ndrivers/net/ethernet/drivers/net/ethernet/google/gve/gve_tx_dqo.c:178:5 index 18 is out of\nrange for type \u0027dma_addr_t[18]\u0027 (aka \u0027unsigned long long[18]\u0027)\nWorkqueue: gve gve_service_task [gve]\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl+0x33/0xa0\n__ubsan_handle_out_of_bounds+0xdc/0x110\ngve_tx_stop_ring_dqo+0x182/0x200 [gve]\ngve_close+0x1be/0x450 [gve]\ngve_reset+0x99/0x120 [gve]\ngve_service_task+0x61/0x100 [gve]\nprocess_scheduled_works+0x1e9/0x380\n\nFix this by properly checking for QPL mode and delegating to\ngve_free_tx_qpl_bufs() to reclaim the buffers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23386",
"url": "https://www.suse.com/security/cve/CVE-2026-23386"
},
{
"category": "external",
"summary": "SUSE Bug 1260799 for CVE-2026-23386",
"url": "https://bugzilla.suse.com/1260799"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23386"
},
{
"cve": "CVE-2026-23393",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23393"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbridge: cfm: Fix race condition in peer_mep deletion\n\nWhen a peer MEP is being deleted, cancel_delayed_work_sync() is called\non ccm_rx_dwork before freeing. However, br_cfm_frame_rx() runs in\nsoftirq context under rcu_read_lock (without RTNL) and can re-schedule\nccm_rx_dwork via ccm_rx_timer_start() between cancel_delayed_work_sync()\nreturning and kfree_rcu() being called.\n\nThe following is a simple race scenario:\n\n cpu0 cpu1\n\nmep_delete_implementation()\n cancel_delayed_work_sync(ccm_rx_dwork);\n br_cfm_frame_rx()\n // peer_mep still in hlist\n if (peer_mep-\u003eccm_defect)\n ccm_rx_timer_start()\n queue_delayed_work(ccm_rx_dwork)\n hlist_del_rcu(\u0026peer_mep-\u003ehead);\n kfree_rcu(peer_mep, rcu);\n ccm_rx_work_expired()\n // on freed peer_mep\n\nTo prevent this, cancel_delayed_work_sync() is replaced with\ndisable_delayed_work_sync() in both peer MEP deletion paths, so\nthat subsequent queue_delayed_work() calls from br_cfm_frame_rx()\nare silently rejected.\n\nThe cc_peer_disable() helper retains cancel_delayed_work_sync()\nbecause it is also used for the CC enable/disable toggle path where\nthe work must remain re-schedulable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23393",
"url": "https://www.suse.com/security/cve/CVE-2026-23393"
},
{
"category": "external",
"summary": "SUSE Bug 1260522 for CVE-2026-23393",
"url": "https://bugzilla.suse.com/1260522"
},
{
"category": "external",
"summary": "SUSE Bug 1260524 for CVE-2026-23393",
"url": "https://bugzilla.suse.com/1260524"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "important"
}
],
"title": "CVE-2026-23393"
},
{
"cve": "CVE-2026-23398",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23398"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nicmp: fix NULL pointer dereference in icmp_tag_validation()\n\nicmp_tag_validation() unconditionally dereferences the result of\nrcu_dereference(inet_protos[proto]) without checking for NULL.\nThe inet_protos[] array is sparse -- only about 15 of 256 protocol\nnumbers have registered handlers. When ip_no_pmtu_disc is set to 3\n(hardened PMTU mode) and the kernel receives an ICMP Fragmentation\nNeeded error with a quoted inner IP header containing an unregistered\nprotocol number, the NULL dereference causes a kernel panic in\nsoftirq context.\n\n Oops: general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] SMP KASAN NOPTI\n KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]\n RIP: 0010:icmp_unreach (net/ipv4/icmp.c:1085 net/ipv4/icmp.c:1143)\n Call Trace:\n \u003cIRQ\u003e\n icmp_rcv (net/ipv4/icmp.c:1527)\n ip_protocol_deliver_rcu (net/ipv4/ip_input.c:207)\n ip_local_deliver_finish (net/ipv4/ip_input.c:242)\n ip_local_deliver (net/ipv4/ip_input.c:262)\n ip_rcv (net/ipv4/ip_input.c:573)\n __netif_receive_skb_one_core (net/core/dev.c:6164)\n process_backlog (net/core/dev.c:6628)\n handle_softirqs (kernel/softirq.c:561)\n \u003c/IRQ\u003e\n\nAdd a NULL check before accessing icmp_strict_tag_validation. If the\nprotocol has no registered handler, return false since it cannot\nperform strict tag validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23398",
"url": "https://www.suse.com/security/cve/CVE-2026-23398"
},
{
"category": "external",
"summary": "SUSE Bug 1260730 for CVE-2026-23398",
"url": "https://bugzilla.suse.com/1260730"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23398"
},
{
"cve": "CVE-2026-23413",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23413"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclsact: Fix use-after-free in init/destroy rollback asymmetry\n\nFix a use-after-free in the clsact qdisc upon init/destroy rollback asymmetry.\nThe latter is achieved by first fully initializing a clsact instance, and\nthen in a second step having a replacement failure for the new clsact qdisc\ninstance. clsact_init() initializes ingress first and then takes care of the\negress part. This can fail midway, for example, via tcf_block_get_ext(). Upon\nfailure, the kernel will trigger the clsact_destroy() callback.\n\nCommit 1cb6f0bae504 (\"bpf: Fix too early release of tcx_entry\") details the\nway how the transition is happening. If tcf_block_get_ext on the q-\u003eingress_block\nends up failing, we took the tcx_miniq_inc reference count on the ingress\nside, but not yet on the egress side. clsact_destroy() tests whether the\n{ingress,egress}_entry was non-NULL. However, even in midway failure on the\nreplacement, both are in fact non-NULL with a valid egress_entry from the\nprevious clsact instance.\n\nWhat we really need to test for is whether the qdisc instance-specific ingress\nor egress side previously got initialized. This adds a small helper for checking\nthe miniq initialization called mini_qdisc_pair_inited, and utilizes that upon\nclsact_destroy() in order to fix the use-after-free scenario. Convert the\ningress_destroy() side as well so both are consistent to each other.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23413",
"url": "https://www.suse.com/security/cve/CVE-2026-23413"
},
{
"category": "external",
"summary": "SUSE Bug 1261498 for CVE-2026-23413",
"url": "https://bugzilla.suse.com/1261498"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23413"
},
{
"cve": "CVE-2026-23414",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23414"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntls: Purge async_hold in tls_decrypt_async_wait()\n\nThe async_hold queue pins encrypted input skbs while\nthe AEAD engine references their scatterlist data. Once\ntls_decrypt_async_wait() returns, every AEAD operation\nhas completed and the engine no longer references those\nskbs, so they can be freed unconditionally.\n\nA subsequent patch adds batch async decryption to\ntls_sw_read_sock(), introducing a new call site that\nmust drain pending AEAD operations and release held\nskbs. Move __skb_queue_purge(\u0026ctx-\u003easync_hold) into\ntls_decrypt_async_wait() so the purge is centralized\nand every caller -- recvmsg\u0027s drain path, the -EBUSY\nfallback in tls_do_decryption(), and the new read_sock\nbatch path -- releases held skbs on synchronization\nwithout each site managing the purge independently.\n\nThis fixes a leak when tls_strp_msg_hold() fails part-way through,\nafter having added some cloned skbs to the async_hold\nqueue. tls_decrypt_sg() will then call tls_decrypt_async_wait() to\nprocess all pending decrypts, and drop back to synchronous mode, but\ntls_sw_recvmsg() only flushes the async_hold queue when one record has\nbeen processed in \"fully-async\" mode, which may not be the case here.\n\n[pabeni@redhat.com: added leak comment]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23414",
"url": "https://www.suse.com/security/cve/CVE-2026-23414"
},
{
"category": "external",
"summary": "SUSE Bug 1261496 for CVE-2026-23414",
"url": "https://bugzilla.suse.com/1261496"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23414"
},
{
"cve": "CVE-2026-23419",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23419"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/rds: Fix circular locking dependency in rds_tcp_tune\n\nsyzbot reported a circular locking dependency in rds_tcp_tune() where\nsk_net_refcnt_upgrade() is called while holding the socket lock:\n\n======================================================\nWARNING: possible circular locking dependency detected\n======================================================\nkworker/u10:8/15040 is trying to acquire lock:\nffffffff8e9aaf80 (fs_reclaim){+.+.}-{0:0},\nat: __kmalloc_cache_noprof+0x4b/0x6f0\n\nbut task is already holding lock:\nffff88805a3c1ce0 (k-sk_lock-AF_INET6){+.+.}-{0:0},\nat: rds_tcp_tune+0xd7/0x930\n\nThe issue occurs because sk_net_refcnt_upgrade() performs memory\nallocation (via get_net_track() -\u003e ref_tracker_alloc()) while the\nsocket lock is held, creating a circular dependency with fs_reclaim.\n\nFix this by moving sk_net_refcnt_upgrade() outside the socket lock\ncritical section. This is safe because the fields modified by the\nsk_net_refcnt_upgrade() call (sk_net_refcnt, ns_tracker) are not\naccessed by any concurrent code path at this point.\n\nv2:\n - Corrected fixes tag\n - check patch line wrap nits\n - ai commentary nits",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23419",
"url": "https://www.suse.com/security/cve/CVE-2026-23419"
},
{
"category": "external",
"summary": "SUSE Bug 1261507 for CVE-2026-23419",
"url": "https://bugzilla.suse.com/1261507"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23419"
},
{
"cve": "CVE-2026-23425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23425"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: arm64: Fix ID register initialization for non-protected pKVM guests\n\nIn protected mode, the hypervisor maintains a separate instance of\nthe `kvm` structure for each VM. For non-protected VMs, this structure is\ninitialized from the host\u0027s `kvm` state.\n\nCurrently, `pkvm_init_features_from_host()` copies the\n`KVM_ARCH_FLAG_ID_REGS_INITIALIZED` flag from the host without the\nunderlying `id_regs` data being initialized. This results in the\nhypervisor seeing the flag as set while the ID registers remain zeroed.\n\nConsequently, `kvm_has_feat()` checks at EL2 fail (return 0) for\nnon-protected VMs. This breaks logic that relies on feature detection,\nsuch as `ctxt_has_tcrx()` for TCR2_EL1 support. As a result, certain\nsystem registers (e.g., TCR2_EL1, PIR_EL1, POR_EL1) are not\nsaved/restored during the world switch, which could lead to state\ncorruption.\n\nFix this by explicitly copying the ID registers from the host `kvm` to\nthe hypervisor `kvm` for non-protected VMs during initialization, since\nwe trust the host with its non-protected guests\u0027 features. Also ensure\n`KVM_ARCH_FLAG_ID_REGS_INITIALIZED` is cleared initially in\n`pkvm_init_features_from_host` so that `vm_copy_id_regs` can properly\ninitialize them and set the flag once done.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23425",
"url": "https://www.suse.com/security/cve/CVE-2026-23425"
},
{
"category": "external",
"summary": "SUSE Bug 1261506 for CVE-2026-23425",
"url": "https://bugzilla.suse.com/1261506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "moderate"
}
],
"title": "CVE-2026-23425"
},
{
"cve": "CVE-2026-31788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31788"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/privcmd: restrict usage in unprivileged domU\n\nThe Xen privcmd driver allows to issue arbitrary hypercalls from\nuser space processes. This is normally no problem, as access is\nusually limited to root and the hypervisor will deny any hypercalls\naffecting other domains.\n\nIn case the guest is booted using secure boot, however, the privcmd\ndriver would be enabling a root user process to modify e.g. kernel\nmemory contents, thus breaking the secure boot feature.\n\nThe only known case where an unprivileged domU is really needing to\nuse the privcmd driver is the case when it is acting as the device\nmodel for another guest. In this case all hypercalls issued via the\nprivcmd driver will target that other guest.\n\nFortunately the privcmd driver can already be locked down to allow\nonly hypercalls targeting a specific domain, but this mode can be\nactivated from user land only today.\n\nThe target domain can be obtained from Xenstore, so when not running\nin dom0 restrict the privcmd driver to that target domain from the\nbeginning, resolving the potential problem of breaking secure boot.\n\nThis is XSA-482\n\n---\nV2:\n- defer reading from Xenstore if Xenstore isn\u0027t ready yet (Jan Beulich)\n- wait in open() if target domain isn\u0027t known yet\n- issue message in case no target domain found (Jan Beulich)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31788",
"url": "https://www.suse.com/security/cve/CVE-2026-31788"
},
{
"category": "external",
"summary": "SUSE Bug 1259707 for CVE-2026-31788",
"url": "https://bugzilla.suse.com/1259707"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:kernel-64kb-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-64kb-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.aarch64",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-base-6.12.0-160000.27.1.160000.2.8.x86_64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-extra-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.ppc64le",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.s390x",
"SUSE Linux Micro 6.2:kernel-default-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-devel-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-macros-6.12.0-160000.28.1.noarch",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.aarch64",
"SUSE Linux Micro 6.2:kernel-rt-devel-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-rt-livepatch-6.12.0-160000.28.1.x86_64",
"SUSE Linux Micro 6.2:kernel-source-6.12.0-160000.28.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-20T15:44:52Z",
"details": "important"
}
],
"title": "CVE-2026-31788"
}
]
}
MSRC_CVE-2026-23239
Vulnerability from csaf_microsoft - Published: 2026-03-02 00:00 - Updated: 2026-03-26 01:37| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-23239 espintcp: Fix race condition in espintcp_close() - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-23239.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "espintcp: Fix race condition in espintcp_close()",
"tracking": {
"current_release_date": "2026-03-26T01:37:49.000Z",
"generator": {
"date": "2026-03-26T07:07:42.369Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-23239",
"initial_release_date": "2026-03-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-03-12T01:01:37.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-03-26T01:37:49.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"category": "product_name",
"name": "azl3 kernel 6.6.126.1-1",
"product": {
"name": "azl3 kernel 6.6.126.1-1",
"product_id": "1"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 6.6.126.1-1 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-23239",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"17084-1"
]
}
],
"notes": [
{
"category": "general",
"text": "Linux",
"title": "Assigning CNA"
}
],
"product_status": {
"known_not_affected": [
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-23239 espintcp: Fix race condition in espintcp_close() - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-23239.json"
}
],
"title": "espintcp: Fix race condition in espintcp_close()"
}
]
}
GHSA-246X-P35Q-QHCQ
Vulnerability from github – Published: 2026-03-10 18:31 – Updated: 2026-04-02 15:31In the Linux kernel, the following vulnerability has been resolved:
espintcp: Fix race condition in espintcp_close()
This issue was discovered during a code audit.
After cancel_work_sync() is called from espintcp_close(), espintcp_tx_work() can still be scheduled from paths such as the Delayed ACK handler or ksoftirqd. As a result, the espintcp_tx_work() worker may dereference a freed espintcp ctx or sk.
The following is a simple race scenario:
cpu0 cpu1
espintcp_close() cancel_work_sync(&ctx->work); espintcp_write_space() schedule_work(&ctx->work);
To prevent this race condition, cancel_work_sync() is replaced with disable_work_sync().
{
"affected": [],
"aliases": [
"CVE-2026-23239"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-03-10T18:18:13Z",
"severity": "HIGH"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nespintcp: Fix race condition in espintcp_close()\n\nThis issue was discovered during a code audit.\n\nAfter cancel_work_sync() is called from espintcp_close(),\nespintcp_tx_work() can still be scheduled from paths such as\nthe Delayed ACK handler or ksoftirqd.\nAs a result, the espintcp_tx_work() worker may dereference a\nfreed espintcp ctx or sk.\n\nThe following is a simple race scenario:\n\n cpu0 cpu1\n\n espintcp_close()\n cancel_work_sync(\u0026ctx-\u003ework);\n espintcp_write_space()\n schedule_work(\u0026ctx-\u003ework);\n\nTo prevent this race condition, cancel_work_sync() is\nreplaced with disable_work_sync().",
"id": "GHSA-246x-p35q-qhcq",
"modified": "2026-04-02T15:31:35Z",
"published": "2026-03-10T18:31:19Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23239"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/022ff7f347588de6e17879a1da6019647b21321b"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/664e9df53226b4505a0894817ecad2c610ab11d8"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/e1512c1db9e8794d8d130addd2615ec27231d994"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/f7ad8b1d0e421c524604d5076b73232093490d5c"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.