Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-23272 (GCVE-0-2026-23272)
Vulnerability from cvelistv5 – Published: 2026-03-20 08:08 – Updated: 2026-04-13 06:03| Vendor | Product | Version | ||
|---|---|---|---|---|
| Linux | Linux |
Affected:
35d0ac9070ef619e3bf44324375878a1c540387b , < 6826131c7674329335ca25df2550163eb8a1fd0c
(git)
Affected: 35d0ac9070ef619e3bf44324375878a1c540387b , < ccb8c8f3c1127cf34d18c737309897c68046bf21 (git) Affected: 35d0ac9070ef619e3bf44324375878a1c540387b , < def602e498a4f951da95c95b1b8ce8ae68aa733a (git) Affected: fefdd79403e89b0c673965343b92e2e01e2713a8 (git) |
||
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"net/netfilter/nf_tables_api.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "6826131c7674329335ca25df2550163eb8a1fd0c",
"status": "affected",
"version": "35d0ac9070ef619e3bf44324375878a1c540387b",
"versionType": "git"
},
{
"lessThan": "ccb8c8f3c1127cf34d18c737309897c68046bf21",
"status": "affected",
"version": "35d0ac9070ef619e3bf44324375878a1c540387b",
"versionType": "git"
},
{
"lessThan": "def602e498a4f951da95c95b1b8ce8ae68aa733a",
"status": "affected",
"version": "35d0ac9070ef619e3bf44324375878a1c540387b",
"versionType": "git"
},
{
"status": "affected",
"version": "fefdd79403e89b0c673965343b92e2e01e2713a8",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"net/netfilter/nf_tables_api.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "4.10"
},
{
"lessThan": "4.10",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.17",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.19.*",
"status": "unaffected",
"version": "6.19.7",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "7.0",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.17",
"versionStartIncluding": "4.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.19.7",
"versionStartIncluding": "4.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0",
"versionStartIncluding": "4.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.9.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: unconditionally bump set-\u003enelems before insertion\n\nIn case that the set is full, a new element gets published then removed\nwithout waiting for the RCU grace period, while RCU reader can be\nwalking over it already.\n\nTo address this issue, add the element transaction even if set is full,\nbut toggle the set_full flag to report -ENFILE so the abort path safely\nunwinds the set to its previous state.\n\nAs for element updates, decrement set-\u003enelems to restore it.\n\nA simpler fix is to call synchronize_rcu() in the error path.\nHowever, with a large batch adding elements to already maxed-out set,\nthis could cause noticeable slowdown of such batches."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-13T06:03:21.164Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/6826131c7674329335ca25df2550163eb8a1fd0c"
},
{
"url": "https://git.kernel.org/stable/c/ccb8c8f3c1127cf34d18c737309897c68046bf21"
},
{
"url": "https://git.kernel.org/stable/c/def602e498a4f951da95c95b1b8ce8ae68aa733a"
}
],
"title": "netfilter: nf_tables: unconditionally bump set-\u003enelems before insertion",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-23272",
"datePublished": "2026-03-20T08:08:52.946Z",
"dateReserved": "2026-01-13T15:37:45.991Z",
"dateUpdated": "2026-04-13T06:03:21.164Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-23272",
"date": "2026-04-15",
"epss": "0.00013",
"percentile": "0.02109"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-23272\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-03-20T09:16:12.700\",\"lastModified\":\"2026-04-02T15:16:28.417\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nnetfilter: nf_tables: unconditionally bump set-\u003enelems before insertion\\n\\nIn case that the set is full, a new element gets published then removed\\nwithout waiting for the RCU grace period, while RCU reader can be\\nwalking over it already.\\n\\nTo address this issue, add the element transaction even if set is full,\\nbut toggle the set_full flag to report -ENFILE so the abort path safely\\nunwinds the set to its previous state.\\n\\nAs for element updates, decrement set-\u003enelems to restore it.\\n\\nA simpler fix is to call synchronize_rcu() in the error path.\\nHowever, with a large batch adding elements to already maxed-out set,\\nthis could cause noticeable slowdown of such batches.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\\n\\nnetfilter: nf_tables: incrementar incondicionalmente set-\u0026gt;nelems antes de la inserci\u00f3n\\n\\nEn caso de que el conjunto est\u00e9 lleno, se publica un nuevo elemento que luego se elimina sin esperar el per\u00edodo de gracia de RCU, mientras que un lector de RCU ya puede estar recorri\u00e9ndolo.\\n\\nPara abordar este problema, a\u00f1adir la transacci\u00f3n del elemento incluso si el conjunto est\u00e1 lleno, pero alternar la bandera set_full para informar -ENFILE de modo que la ruta de aborto deshaga de forma segura el conjunto a su estado anterior.\\n\\nEn cuanto a las actualizaciones de elementos, decrementar set-\u0026gt;nelems para restaurarlo.\\n\\nUna soluci\u00f3n m\u00e1s simple es llamar a synchronize_rcu() en la ruta de error.\\nSin embargo, con un gran lote a\u00f1adiendo elementos a un conjunto ya agotado, esto podr\u00eda causar una ralentizaci\u00f3n notable de dichos lotes.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/6826131c7674329335ca25df2550163eb8a1fd0c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/ccb8c8f3c1127cf34d18c737309897c68046bf21\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/def602e498a4f951da95c95b1b8ce8ae68aa733a\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
}
}
SUSE-SU-2026:1342-1
Vulnerability from csaf_suse - Published: 2026-04-15 10:15 - Updated: 2026-04-15 10:15{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 15 SP3 kernel was updated to fix various security issues.\n\nThe following security issues were fixed:\n\n- CVE-2025-38234: sched/rt: Fix race in push_rt_task (bsc#1246057).\n- CVE-2026-23103: ipvlan: Make the addrs_lock be per port (bsc#1257773).\n- CVE-2026-23243: RDMA/umad: Reject negative data_len in ib_umad_write (bsc#1259797).\n- CVE-2026-23272: netfilter: nf_tables: unconditionally bump set-\u003enelems before insertion (bsc#1260009).\n- CVE-2026-23274: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels (bsc#1260005).\n- CVE-2026-23293: net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled (bsc#1260486).\n- CVE-2026-23398: icmp: fix NULL pointer dereference in icmp_tag_validation() (bsc#1260730).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1342,SUSE-SUSE-MicroOS-5.2-2026-1342",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1342-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1342-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261342-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1342-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-April/045543.html"
},
{
"category": "self",
"summary": "SUSE Bug 1246057",
"url": "https://bugzilla.suse.com/1246057"
},
{
"category": "self",
"summary": "SUSE Bug 1257773",
"url": "https://bugzilla.suse.com/1257773"
},
{
"category": "self",
"summary": "SUSE Bug 1259797",
"url": "https://bugzilla.suse.com/1259797"
},
{
"category": "self",
"summary": "SUSE Bug 1260005",
"url": "https://bugzilla.suse.com/1260005"
},
{
"category": "self",
"summary": "SUSE Bug 1260009",
"url": "https://bugzilla.suse.com/1260009"
},
{
"category": "self",
"summary": "SUSE Bug 1260486",
"url": "https://bugzilla.suse.com/1260486"
},
{
"category": "self",
"summary": "SUSE Bug 1260730",
"url": "https://bugzilla.suse.com/1260730"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-38234 page",
"url": "https://www.suse.com/security/cve/CVE-2025-38234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23103 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23243 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23243/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23272 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23272/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23274 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23274/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23293 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23293/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-23398 page",
"url": "https://www.suse.com/security/cve/CVE-2026-23398/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-04-15T10:15:54Z",
"generator": {
"date": "2026-04-15T10:15:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1342-1",
"initial_release_date": "2026-04-15T10:15:54Z",
"revision_history": [
{
"date": "2026-04-15T10:15:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-150300.59.241.1.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.241.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.241.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-150300.59.241.1.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.241.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.241.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-al-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-al-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-al-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-allwinner-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-allwinner-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-altera-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-altera-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-amd-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-amd-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-amlogic-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-amlogic-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-apm-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-apm-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-arm-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-arm-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-broadcom-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-broadcom-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-cavium-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-cavium-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-exynos-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-exynos-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-freescale-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-freescale-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-hisilicon-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-hisilicon-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-lg-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-lg-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-marvell-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-marvell-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-mediatek-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-mediatek-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-nvidia-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-nvidia-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-qcom-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-qcom-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-renesas-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-renesas-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-rockchip-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-rockchip-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-socionext-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-socionext-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-sprd-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-sprd-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-xilinx-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-xilinx-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-zte-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "dtb-zte-5.3.18-150300.59.241.1.aarch64",
"product_id": "dtb-zte-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-150300.59.241.1.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.241.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.241.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-150300.59.241.1.aarch64",
"product_id": "kernel-64kb-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-150300.59.241.1.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-150300.59.241.1.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-150300.59.241.1.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-150300.59.241.1.aarch64",
"product_id": "kernel-default-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"product_id": "kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.241.1.150300.18.144.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.241.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.241.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.241.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.241.1.aarch64",
"product_id": "kernel-default-optional-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.241.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.241.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-150300.59.241.1.aarch64",
"product_id": "kernel-preempt-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150300.59.241.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150300.59.241.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-150300.59.241.1.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-150300.59.241.1.aarch64",
"product_id": "kernel-syms-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-150300.59.241.1.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.241.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.241.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-150300.59.241.1.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.241.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.241.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-150300.59.241.1.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.241.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.241.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.241.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.241.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.241.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-150300.59.241.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-150300.59.241.1.noarch",
"product_id": "kernel-devel-5.3.18-150300.59.241.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-150300.59.241.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-150300.59.241.1.noarch",
"product_id": "kernel-docs-5.3.18-150300.59.241.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-150300.59.241.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-150300.59.241.1.noarch",
"product_id": "kernel-docs-html-5.3.18-150300.59.241.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-150300.59.241.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-150300.59.241.1.noarch",
"product_id": "kernel-macros-5.3.18-150300.59.241.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-150300.59.241.1.noarch",
"product": {
"name": "kernel-source-5.3.18-150300.59.241.1.noarch",
"product_id": "kernel-source-5.3.18-150300.59.241.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-150300.59.241.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-150300.59.241.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-150300.59.241.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.241.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.241.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.241.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.241.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.241.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-150300.59.241.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.241.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.241.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.241.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.241.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-150300.59.241.1.ppc64le",
"product_id": "kernel-default-5.3.18-150300.59.241.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.ppc64le",
"product_id": "kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.241.1.150300.18.144.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.241.1.150300.18.144.1.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.241.1.150300.18.144.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.241.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.241.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-150300.59.241.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.241.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.241.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-150300.59.241.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.241.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.241.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.241.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.241.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.241.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.241.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.241.1.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.241.1.ppc64le",
"product_id": "kernel-default-optional-5.3.18-150300.59.241.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150300.59.241.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-150300.59.241.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-150300.59.241.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.241.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.241.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.241.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.241.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.241.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-150300.59.241.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.241.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.241.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-150300.59.241.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.241.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-150300.59.241.1.ppc64le",
"product_id": "kernel-syms-5.3.18-150300.59.241.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.241.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.241.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.241.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.241.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.241.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.241.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.241.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.241.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.241.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.241.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.241.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.241.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.241.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.241.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-150300.59.241.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.241.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.241.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.241.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.241.1.s390x",
"product": {
"name": "kernel-default-5.3.18-150300.59.241.1.s390x",
"product_id": "kernel-default-5.3.18-150300.59.241.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.s390x",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.s390x",
"product_id": "kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.241.1.150300.18.144.1.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.241.1.150300.18.144.1.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.241.1.150300.18.144.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.241.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.241.1.s390x",
"product_id": "kernel-default-devel-5.3.18-150300.59.241.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.241.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.241.1.s390x",
"product_id": "kernel-default-extra-5.3.18-150300.59.241.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.241.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.241.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.241.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.241.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.241.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.241.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.241.1.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.241.1.s390x",
"product_id": "kernel-default-optional-5.3.18-150300.59.241.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.241.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.241.1.s390x",
"product_id": "kernel-obs-build-5.3.18-150300.59.241.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.241.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.241.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-150300.59.241.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.241.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-150300.59.241.1.s390x",
"product_id": "kernel-syms-5.3.18-150300.59.241.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-150300.59.241.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-150300.59.241.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-150300.59.241.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.241.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.241.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.241.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.241.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.241.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.241.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.241.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.241.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.241.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.241.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.241.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.241.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.241.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.241.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.241.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-150300.59.241.1.x86_64",
"product_id": "kernel-default-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"product_id": "kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.241.1.150300.18.144.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.241.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.241.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.241.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.241.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.241.1.x86_64",
"product_id": "kernel-default-optional-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-150300.59.241.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.241.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.241.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.241.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-150300.59.241.1.x86_64",
"product_id": "kernel-preempt-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150300.59.241.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150300.59.241.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-150300.59.241.1.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-150300.59.241.1.x86_64",
"product_id": "kernel-syms-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.241.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.241.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.241.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.241.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.241.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.241.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.241.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.241.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.241.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.241.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.241.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.241.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.241.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.241.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.241.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.241.1.noarch as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.241.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.241.1.noarch as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.241.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-38234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-38234"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/rt: Fix race in push_rt_task\n\nOverview\n========\nWhen a CPU chooses to call push_rt_task and picks a task to push to\nanother CPU\u0027s runqueue then it will call find_lock_lowest_rq method\nwhich would take a double lock on both CPUs\u0027 runqueues. If one of the\nlocks aren\u0027t readily available, it may lead to dropping the current\nrunqueue lock and reacquiring both the locks at once. During this window\nit is possible that the task is already migrated and is running on some\nother CPU. These cases are already handled. However, if the task is\nmigrated and has already been executed and another CPU is now trying to\nwake it up (ttwu) such that it is queued again on the runqeue\n(on_rq is 1) and also if the task was run by the same CPU, then the\ncurrent checks will pass even though the task was migrated out and is no\nlonger in the pushable tasks list.\n\nCrashes\n=======\nThis bug resulted in quite a few flavors of crashes triggering kernel\npanics with various crash signatures such as assert failures, page\nfaults, null pointer dereferences, and queue corruption errors all\ncoming from scheduler itself.\n\nSome of the crashes:\n-\u003e kernel BUG at kernel/sched/rt.c:1616! BUG_ON(idx \u003e= MAX_RT_PRIO)\n Call Trace:\n ? __die_body+0x1a/0x60\n ? die+0x2a/0x50\n ? do_trap+0x85/0x100\n ? pick_next_task_rt+0x6e/0x1d0\n ? do_error_trap+0x64/0xa0\n ? pick_next_task_rt+0x6e/0x1d0\n ? exc_invalid_op+0x4c/0x60\n ? pick_next_task_rt+0x6e/0x1d0\n ? asm_exc_invalid_op+0x12/0x20\n ? pick_next_task_rt+0x6e/0x1d0\n __schedule+0x5cb/0x790\n ? update_ts_time_stats+0x55/0x70\n schedule_idle+0x1e/0x40\n do_idle+0x15e/0x200\n cpu_startup_entry+0x19/0x20\n start_secondary+0x117/0x160\n secondary_startup_64_no_verify+0xb0/0xbb\n\n-\u003e BUG: kernel NULL pointer dereference, address: 00000000000000c0\n Call Trace:\n ? __die_body+0x1a/0x60\n ? no_context+0x183/0x350\n ? __warn+0x8a/0xe0\n ? exc_page_fault+0x3d6/0x520\n ? asm_exc_page_fault+0x1e/0x30\n ? pick_next_task_rt+0xb5/0x1d0\n ? pick_next_task_rt+0x8c/0x1d0\n __schedule+0x583/0x7e0\n ? update_ts_time_stats+0x55/0x70\n schedule_idle+0x1e/0x40\n do_idle+0x15e/0x200\n cpu_startup_entry+0x19/0x20\n start_secondary+0x117/0x160\n secondary_startup_64_no_verify+0xb0/0xbb\n\n-\u003e BUG: unable to handle page fault for address: ffff9464daea5900\n kernel BUG at kernel/sched/rt.c:1861! BUG_ON(rq-\u003ecpu != task_cpu(p))\n\n-\u003e kernel BUG at kernel/sched/rt.c:1055! BUG_ON(!rq-\u003enr_running)\n Call Trace:\n ? __die_body+0x1a/0x60\n ? die+0x2a/0x50\n ? do_trap+0x85/0x100\n ? dequeue_top_rt_rq+0xa2/0xb0\n ? do_error_trap+0x64/0xa0\n ? dequeue_top_rt_rq+0xa2/0xb0\n ? exc_invalid_op+0x4c/0x60\n ? dequeue_top_rt_rq+0xa2/0xb0\n ? asm_exc_invalid_op+0x12/0x20\n ? dequeue_top_rt_rq+0xa2/0xb0\n dequeue_rt_entity+0x1f/0x70\n dequeue_task_rt+0x2d/0x70\n __schedule+0x1a8/0x7e0\n ? blk_finish_plug+0x25/0x40\n schedule+0x3c/0xb0\n futex_wait_queue_me+0xb6/0x120\n futex_wait+0xd9/0x240\n do_futex+0x344/0xa90\n ? get_mm_exe_file+0x30/0x60\n ? audit_exe_compare+0x58/0x70\n ? audit_filter_rules.constprop.26+0x65e/0x1220\n __x64_sys_futex+0x148/0x1f0\n do_syscall_64+0x30/0x80\n entry_SYSCALL_64_after_hwframe+0x62/0xc7\n\n-\u003e BUG: unable to handle page fault for address: ffff8cf3608bc2c0\n Call Trace:\n ? __die_body+0x1a/0x60\n ? no_context+0x183/0x350\n ? spurious_kernel_fault+0x171/0x1c0\n ? exc_page_fault+0x3b6/0x520\n ? plist_check_list+0x15/0x40\n ? plist_check_list+0x2e/0x40\n ? asm_exc_page_fault+0x1e/0x30\n ? _cond_resched+0x15/0x30\n ? futex_wait_queue_me+0xc8/0x120\n ? futex_wait+0xd9/0x240\n ? try_to_wake_up+0x1b8/0x490\n ? futex_wake+0x78/0x160\n ? do_futex+0xcd/0xa90\n ? plist_check_list+0x15/0x40\n ? plist_check_list+0x2e/0x40\n ? plist_del+0x6a/0xd0\n ? plist_check_list+0x15/0x40\n ? plist_check_list+0x2e/0x40\n ? dequeue_pushable_task+0x20/0x70\n ? __schedule+0x382/0x7e0\n ? asm_sysvec_reschedule_i\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-38234",
"url": "https://www.suse.com/security/cve/CVE-2025-38234"
},
{
"category": "external",
"summary": "SUSE Bug 1246057 for CVE-2025-38234",
"url": "https://bugzilla.suse.com/1246057"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-15T10:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2025-38234"
},
{
"cve": "CVE-2026-23103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23103"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: Make the addrs_lock be per port\n\nMake the addrs_lock be per port, not per ipvlan dev.\n\nInitial code seems to be written in the assumption,\nthat any address change must occur under RTNL.\nBut it is not so for the case of IPv6. So\n\n1) Introduce per-port addrs_lock.\n\n2) It was needed to fix places where it was forgotten\nto take lock (ipvlan_open/ipvlan_close)\n\nThis appears to be a very minor problem though.\nSince it\u0027s highly unlikely that ipvlan_add_addr() will\nbe called on 2 CPU simultaneously. But nevertheless,\nthis could cause:\n\n1) False-negative of ipvlan_addr_busy(): one interface\niterated through all port-\u003eipvlans + ipvlan-\u003eaddrs\nunder some ipvlan spinlock, and another added IP\nunder its own lock. Though this is only possible\nfor IPv6, since looks like only ipvlan_addr6_event() can be\ncalled without rtnl_lock.\n\n2) Race since ipvlan_ht_addr_add(port) is called under\ndifferent ipvlan-\u003eaddrs_lock locks\n\nThis should not affect performance, since add/remove IP\nis a rare situation and spinlock is not taken on fast\npaths.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23103",
"url": "https://www.suse.com/security/cve/CVE-2026-23103"
},
{
"category": "external",
"summary": "SUSE Bug 1257773 for CVE-2026-23103",
"url": "https://bugzilla.suse.com/1257773"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-15T10:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2026-23103"
},
{
"cve": "CVE-2026-23243",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23243"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/umad: Reject negative data_len in ib_umad_write\n\nib_umad_write computes data_len from user-controlled count and the\nMAD header sizes. With a mismatched user MAD header size and RMPP\nheader length, data_len can become negative and reach ib_create_send_mad().\nThis can make the padding calculation exceed the segment size and trigger\nan out-of-bounds memset in alloc_send_rmpp_list().\n\nAdd an explicit check to reject negative data_len before creating the\nsend buffer.\n\nKASAN splat:\n[ 211.363464] BUG: KASAN: slab-out-of-bounds in ib_create_send_mad+0xa01/0x11b0\n[ 211.364077] Write of size 220 at addr ffff88800c3fa1f8 by task spray_thread/102\n[ 211.365867] ib_create_send_mad+0xa01/0x11b0\n[ 211.365887] ib_umad_write+0x853/0x1c80",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23243",
"url": "https://www.suse.com/security/cve/CVE-2026-23243"
},
{
"category": "external",
"summary": "SUSE Bug 1259797 for CVE-2026-23243",
"url": "https://bugzilla.suse.com/1259797"
},
{
"category": "external",
"summary": "SUSE Bug 1259798 for CVE-2026-23243",
"url": "https://bugzilla.suse.com/1259798"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-15T10:15:54Z",
"details": "important"
}
],
"title": "CVE-2026-23243"
},
{
"cve": "CVE-2026-23272",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23272"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: unconditionally bump set-\u003enelems before insertion\n\nIn case that the set is full, a new element gets published then removed\nwithout waiting for the RCU grace period, while RCU reader can be\nwalking over it already.\n\nTo address this issue, add the element transaction even if set is full,\nbut toggle the set_full flag to report -ENFILE so the abort path safely\nunwinds the set to its previous state.\n\nAs for element updates, decrement set-\u003enelems to restore it.\n\nA simpler fix is to call synchronize_rcu() in the error path.\nHowever, with a large batch adding elements to already maxed-out set,\nthis could cause noticeable slowdown of such batches.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23272",
"url": "https://www.suse.com/security/cve/CVE-2026-23272"
},
{
"category": "external",
"summary": "SUSE Bug 1260009 for CVE-2026-23272",
"url": "https://bugzilla.suse.com/1260009"
},
{
"category": "external",
"summary": "SUSE Bug 1260909 for CVE-2026-23272",
"url": "https://bugzilla.suse.com/1260909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-15T10:15:54Z",
"details": "important"
}
],
"title": "CVE-2026-23272"
},
{
"cve": "CVE-2026-23274",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23274"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels\n\nIDLETIMER revision 0 rules reuse existing timers by label and always call\nmod_timer() on timer-\u003etimer.\n\nIf the label was created first by revision 1 with XT_IDLETIMER_ALARM,\nthe object uses alarm timer semantics and timer-\u003etimer is never initialized.\nReusing that object from revision 0 causes mod_timer() on an uninitialized\ntimer_list, triggering debugobjects warnings and possible panic when\npanic_on_warn=1.\n\nFix this by rejecting revision 0 rule insertion when an existing timer with\nthe same label is of ALARM type.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23274",
"url": "https://www.suse.com/security/cve/CVE-2026-23274"
},
{
"category": "external",
"summary": "SUSE Bug 1260005 for CVE-2026-23274",
"url": "https://bugzilla.suse.com/1260005"
},
{
"category": "external",
"summary": "SUSE Bug 1260908 for CVE-2026-23274",
"url": "https://bugzilla.suse.com/1260908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-15T10:15:54Z",
"details": "important"
}
],
"title": "CVE-2026-23274"
},
{
"cve": "CVE-2026-23293",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23293"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled\n\nWhen booting with the \u0027ipv6.disable=1\u0027 parameter, the nd_tbl is never\ninitialized because inet6_init() exits before ndisc_init() is called\nwhich initializes it. If an IPv6 packet is injected into the interface,\nroute_shortcircuit() is called and a NULL pointer dereference happens on\nneigh_lookup().\n\n BUG: kernel NULL pointer dereference, address: 0000000000000380\n Oops: Oops: 0000 [#1] SMP NOPTI\n [...]\n RIP: 0010:neigh_lookup+0x20/0x270\n [...]\n Call Trace:\n \u003cTASK\u003e\n vxlan_xmit+0x638/0x1ef0 [vxlan]\n dev_hard_start_xmit+0x9e/0x2e0\n __dev_queue_xmit+0xbee/0x14e0\n packet_sendmsg+0x116f/0x1930\n __sys_sendto+0x1f5/0x200\n __x64_sys_sendto+0x24/0x30\n do_syscall_64+0x12f/0x1590\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nFix this by adding an early check on route_shortcircuit() when protocol\nis ETH_P_IPV6. Note that ipv6_mod_enabled() cannot be used here because\nVXLAN can be built-in even when IPv6 is built as a module.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23293",
"url": "https://www.suse.com/security/cve/CVE-2026-23293"
},
{
"category": "external",
"summary": "SUSE Bug 1260486 for CVE-2026-23293",
"url": "https://bugzilla.suse.com/1260486"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-15T10:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2026-23293"
},
{
"cve": "CVE-2026-23398",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-23398"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nicmp: fix NULL pointer dereference in icmp_tag_validation()\n\nicmp_tag_validation() unconditionally dereferences the result of\nrcu_dereference(inet_protos[proto]) without checking for NULL.\nThe inet_protos[] array is sparse -- only about 15 of 256 protocol\nnumbers have registered handlers. When ip_no_pmtu_disc is set to 3\n(hardened PMTU mode) and the kernel receives an ICMP Fragmentation\nNeeded error with a quoted inner IP header containing an unregistered\nprotocol number, the NULL dereference causes a kernel panic in\nsoftirq context.\n\n Oops: general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] SMP KASAN NOPTI\n KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]\n RIP: 0010:icmp_unreach (net/ipv4/icmp.c:1085 net/ipv4/icmp.c:1143)\n Call Trace:\n \u003cIRQ\u003e\n icmp_rcv (net/ipv4/icmp.c:1527)\n ip_protocol_deliver_rcu (net/ipv4/ip_input.c:207)\n ip_local_deliver_finish (net/ipv4/ip_input.c:242)\n ip_local_deliver (net/ipv4/ip_input.c:262)\n ip_rcv (net/ipv4/ip_input.c:573)\n __netif_receive_skb_one_core (net/core/dev.c:6164)\n process_backlog (net/core/dev.c:6628)\n handle_softirqs (kernel/softirq.c:561)\n \u003c/IRQ\u003e\n\nAdd a NULL check before accessing icmp_strict_tag_validation. If the\nprotocol has no registered handler, return false since it cannot\nperform strict tag validation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-23398",
"url": "https://www.suse.com/security/cve/CVE-2026-23398"
},
{
"category": "external",
"summary": "SUSE Bug 1260730 for CVE-2026-23398",
"url": "https://bugzilla.suse.com/1260730"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.241.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.241.1.150300.18.144.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-macros-5.3.18-150300.59.241.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-source-5.3.18-150300.59.241.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-04-15T10:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2026-23398"
}
]
}
MSRC_CVE-2026-23272
Vulnerability from csaf_microsoft - Published: 2026-03-02 00:00 - Updated: 2026-03-31 15:05| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-23272 netfilter: nf_tables: unconditionally bump set-\u003enelems before insertion - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-23272.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "netfilter: nf_tables: unconditionally bump set-\u003enelems before insertion",
"tracking": {
"current_release_date": "2026-03-31T15:05:26.000Z",
"generator": {
"date": "2026-04-01T07:38:22.467Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-23272",
"initial_release_date": "2026-03-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-03-21T01:01:38.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-03-31T15:05:26.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "azl3 kernel 6.6.126.1-1",
"product": {
"name": "azl3 kernel 6.6.126.1-1",
"product_id": "2"
}
},
{
"category": "product_version_range",
"name": "azl3 kernel 6.6.130.1-3",
"product": {
"name": "azl3 kernel 6.6.130.1-3",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "kernel"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 6.6.126.1-1 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 6.6.130.1-3 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-23272",
"notes": [
{
"category": "general",
"text": "Linux",
"title": "Assigning CNA"
}
],
"product_status": {
"known_affected": [
"17084-2",
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-23272 netfilter: nf_tables: unconditionally bump set-\u003enelems before insertion - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-23272.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2026-03-21T01:01:38.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-2"
]
},
{
"category": "none_available",
"date": "2026-03-21T01:01:38.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-1"
]
}
],
"title": "netfilter: nf_tables: unconditionally bump set-\u003enelems before insertion"
}
]
}
FKIE_CVE-2026-23272
Vulnerability from fkie_nvd - Published: 2026-03-20 09:16 - Updated: 2026-04-02 15:16| URL | Tags | ||
|---|---|---|---|
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/6826131c7674329335ca25df2550163eb8a1fd0c | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/ccb8c8f3c1127cf34d18c737309897c68046bf21 | ||
| 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | https://git.kernel.org/stable/c/def602e498a4f951da95c95b1b8ce8ae68aa733a |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: unconditionally bump set-\u003enelems before insertion\n\nIn case that the set is full, a new element gets published then removed\nwithout waiting for the RCU grace period, while RCU reader can be\nwalking over it already.\n\nTo address this issue, add the element transaction even if set is full,\nbut toggle the set_full flag to report -ENFILE so the abort path safely\nunwinds the set to its previous state.\n\nAs for element updates, decrement set-\u003enelems to restore it.\n\nA simpler fix is to call synchronize_rcu() in the error path.\nHowever, with a large batch adding elements to already maxed-out set,\nthis could cause noticeable slowdown of such batches."
},
{
"lang": "es",
"value": "En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta:\n\nnetfilter: nf_tables: incrementar incondicionalmente set-\u0026gt;nelems antes de la inserci\u00f3n\n\nEn caso de que el conjunto est\u00e9 lleno, se publica un nuevo elemento que luego se elimina sin esperar el per\u00edodo de gracia de RCU, mientras que un lector de RCU ya puede estar recorri\u00e9ndolo.\n\nPara abordar este problema, a\u00f1adir la transacci\u00f3n del elemento incluso si el conjunto est\u00e1 lleno, pero alternar la bandera set_full para informar -ENFILE de modo que la ruta de aborto deshaga de forma segura el conjunto a su estado anterior.\n\nEn cuanto a las actualizaciones de elementos, decrementar set-\u0026gt;nelems para restaurarlo.\n\nUna soluci\u00f3n m\u00e1s simple es llamar a synchronize_rcu() en la ruta de error.\nSin embargo, con un gran lote a\u00f1adiendo elementos a un conjunto ya agotado, esto podr\u00eda causar una ralentizaci\u00f3n notable de dichos lotes."
}
],
"id": "CVE-2026-23272",
"lastModified": "2026-04-02T15:16:28.417",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"type": "Secondary"
}
]
},
"published": "2026-03-20T09:16:12.700",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/6826131c7674329335ca25df2550163eb8a1fd0c"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/ccb8c8f3c1127cf34d18c737309897c68046bf21"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/def602e498a4f951da95c95b1b8ce8ae68aa733a"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Awaiting Analysis"
}
GHSA-QHVV-4MW5-PXH3
Vulnerability from github – Published: 2026-03-20 09:32 – Updated: 2026-04-02 15:31In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: unconditionally bump set->nelems before insertion
In case that the set is full, a new element gets published then removed without waiting for the RCU grace period, while RCU reader can be walking over it already.
To address this issue, add the element transaction even if set is full, but toggle the set_full flag to report -ENFILE so the abort path safely unwinds the set to its previous state.
As for element updates, decrement set->nelems to restore it.
A simpler fix is to call synchronize_rcu() in the error path. However, with a large batch adding elements to already maxed-out set, this could cause noticeable slowdown of such batches.
{
"affected": [],
"aliases": [
"CVE-2026-23272"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-03-20T09:16:12Z",
"severity": "HIGH"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: unconditionally bump set-\u003enelems before insertion\n\nIn case that the set is full, a new element gets published then removed\nwithout waiting for the RCU grace period, while RCU reader can be\nwalking over it already.\n\nTo address this issue, add the element transaction even if set is full,\nbut toggle the set_full flag to report -ENFILE so the abort path safely\nunwinds the set to its previous state.\n\nAs for element updates, decrement set-\u003enelems to restore it.\n\nA simpler fix is to call synchronize_rcu() in the error path.\nHowever, with a large batch adding elements to already maxed-out set,\nthis could cause noticeable slowdown of such batches.",
"id": "GHSA-qhvv-4mw5-pxh3",
"modified": "2026-04-02T15:31:36Z",
"published": "2026-03-20T09:32:10Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23272"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/6826131c7674329335ca25df2550163eb8a1fd0c"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/ccb8c8f3c1127cf34d18c737309897c68046bf21"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/def602e498a4f951da95c95b1b8ce8ae68aa733a"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.