Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-31712 (GCVE-0-2026-31712)
Vulnerability from cvelistv5 – Published: 2026-05-01 13:56 – Updated: 2026-05-17 15:21| Vendor | Product | Version | |
|---|---|---|---|
| Linux | Linux |
Affected:
e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 , < 325d4ac11f526cb8964cff14548ccf02d8c756d8
(git)
Affected: e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 , < 95e5aa3c3261da8c95b27d7aecf8ee39b9f86a4c (git) Affected: e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 , < 90089584b2e25c4510b7b987387b4405f0673ece (git) Affected: e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 , < 151b1799861fde38087c08f613abc2843ef597b0 (git) Affected: e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9 , < d07b26f39246a82399661936dd0c853983cfade7 (git) |
|
| Linux | Linux |
Affected:
5.15
Unaffected: 0 , < 5.15 (semver) Unaffected: 6.6.140 , ≤ 6.6.* (semver) Unaffected: 6.12.84 , ≤ 6.12.* (semver) Unaffected: 6.18.25 , ≤ 6.18.* (semver) Unaffected: 7.0.2 , ≤ 7.0.* (semver) Unaffected: 7.1-rc1 , ≤ * (original_commit_for_fix) |
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"fs/smb/server/smbacl.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "325d4ac11f526cb8964cff14548ccf02d8c756d8",
"status": "affected",
"version": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9",
"versionType": "git"
},
{
"lessThan": "95e5aa3c3261da8c95b27d7aecf8ee39b9f86a4c",
"status": "affected",
"version": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9",
"versionType": "git"
},
{
"lessThan": "90089584b2e25c4510b7b987387b4405f0673ece",
"status": "affected",
"version": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9",
"versionType": "git"
},
{
"lessThan": "151b1799861fde38087c08f613abc2843ef597b0",
"status": "affected",
"version": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9",
"versionType": "git"
},
{
"lessThan": "d07b26f39246a82399661936dd0c853983cfade7",
"status": "affected",
"version": "e2f34481b24db2fd634b5edb0a5bd0e4d38cc6e9",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"fs/smb/server/smbacl.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.15"
},
{
"lessThan": "5.15",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.6.*",
"status": "unaffected",
"version": "6.6.140",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.84",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.25",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.0.*",
"status": "unaffected",
"version": "7.0.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "7.1-rc1",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.140",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.84",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.25",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0.2",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.1-rc1",
"versionStartIncluding": "5.15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: require minimum ACE size in smb_check_perm_dacl()\n\nBoth ACE-walk loops in smb_check_perm_dacl() only guard against an\nunder-sized remaining buffer, not against an ACE whose declared\n`ace-\u003esize` is smaller than the struct it claims to describe:\n\n if (offsetof(struct smb_ace, access_req) \u003e aces_size)\n break;\n ace_size = le16_to_cpu(ace-\u003esize);\n if (ace_size \u003e aces_size)\n break;\n\nThe first check only requires the 4-byte ACE header to be in bounds;\nit does not require access_req (4 bytes at offset 4) to be readable.\nAn attacker who has set a crafted DACL on a file they own can declare\nace-\u003esize == 4 with aces_size == 4, pass both checks, and then\n\n granted |= le32_to_cpu(ace-\u003eaccess_req); /* upper loop */\n compare_sids(\u0026sid, \u0026ace-\u003esid); /* lower loop */\n\nreads access_req at offset 4 (OOB by up to 4 bytes) and ace-\u003esid at\noffset 8 (OOB by up to CIFS_SID_BASE_SIZE + SID_MAX_SUB_AUTHORITIES\n* 4 bytes).\n\nTighten both loops to require\n\n ace_size \u003e= offsetof(struct smb_ace, sid) + CIFS_SID_BASE_SIZE\n\nwhich is the smallest valid on-wire ACE layout (4-byte header +\n4-byte access_req + 8-byte sid base with zero sub-auths). Also\nreject ACEs whose sid.num_subauth exceeds SID_MAX_SUB_AUTHORITIES\nbefore letting compare_sids() dereference sub_auth[] entries.\n\nparse_sec_desc() already enforces an equivalent check (lines 441-448);\nsmb_check_perm_dacl() simply grew weaker validation over time.\n\nReachability: authenticated SMB client with permission to set an ACL\non a file. On a subsequent CREATE against that file, the kernel\nwalks the stored DACL via smb_check_perm_dacl() and triggers the\nOOB read. Not pre-auth, and the OOB read is not reflected to the\nattacker, but KASAN reports and kernel state corruption are\npossible."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-05-17T15:21:33.498Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/325d4ac11f526cb8964cff14548ccf02d8c756d8"
},
{
"url": "https://git.kernel.org/stable/c/95e5aa3c3261da8c95b27d7aecf8ee39b9f86a4c"
},
{
"url": "https://git.kernel.org/stable/c/90089584b2e25c4510b7b987387b4405f0673ece"
},
{
"url": "https://git.kernel.org/stable/c/151b1799861fde38087c08f613abc2843ef597b0"
},
{
"url": "https://git.kernel.org/stable/c/d07b26f39246a82399661936dd0c853983cfade7"
}
],
"title": "ksmbd: require minimum ACE size in smb_check_perm_dacl()",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-31712",
"datePublished": "2026-05-01T13:56:08.583Z",
"dateReserved": "2026-03-09T15:48:24.133Z",
"dateUpdated": "2026-05-17T15:21:33.498Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-31712",
"date": "2026-05-21",
"epss": "0.00051",
"percentile": "0.15897"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-31712\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-05-01T14:16:21.270\",\"lastModified\":\"2026-05-17T16:16:16.050\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nksmbd: require minimum ACE size in smb_check_perm_dacl()\\n\\nBoth ACE-walk loops in smb_check_perm_dacl() only guard against an\\nunder-sized remaining buffer, not against an ACE whose declared\\n`ace-\u003esize` is smaller than the struct it claims to describe:\\n\\n if (offsetof(struct smb_ace, access_req) \u003e aces_size)\\n break;\\n ace_size = le16_to_cpu(ace-\u003esize);\\n if (ace_size \u003e aces_size)\\n break;\\n\\nThe first check only requires the 4-byte ACE header to be in bounds;\\nit does not require access_req (4 bytes at offset 4) to be readable.\\nAn attacker who has set a crafted DACL on a file they own can declare\\nace-\u003esize == 4 with aces_size == 4, pass both checks, and then\\n\\n granted |= le32_to_cpu(ace-\u003eaccess_req); /* upper loop */\\n compare_sids(\u0026sid, \u0026ace-\u003esid); /* lower loop */\\n\\nreads access_req at offset 4 (OOB by up to 4 bytes) and ace-\u003esid at\\noffset 8 (OOB by up to CIFS_SID_BASE_SIZE + SID_MAX_SUB_AUTHORITIES\\n* 4 bytes).\\n\\nTighten both loops to require\\n\\n ace_size \u003e= offsetof(struct smb_ace, sid) + CIFS_SID_BASE_SIZE\\n\\nwhich is the smallest valid on-wire ACE layout (4-byte header +\\n4-byte access_req + 8-byte sid base with zero sub-auths). Also\\nreject ACEs whose sid.num_subauth exceeds SID_MAX_SUB_AUTHORITIES\\nbefore letting compare_sids() dereference sub_auth[] entries.\\n\\nparse_sec_desc() already enforces an equivalent check (lines 441-448);\\nsmb_check_perm_dacl() simply grew weaker validation over time.\\n\\nReachability: authenticated SMB client with permission to set an ACL\\non a file. On a subsequent CREATE against that file, the kernel\\nwalks the stored DACL via smb_check_perm_dacl() and triggers the\\nOOB read. Not pre-auth, and the OOB read is not reflected to the\\nattacker, but KASAN reports and kernel state corruption are\\npossible.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H\",\"baseScore\":8.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.5}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.15\",\"versionEndExcluding\":\"6.12.84\",\"matchCriteriaId\":\"04651641-C387-4546-B02F-17BA989CC253\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.13\",\"versionEndExcluding\":\"6.18.25\",\"matchCriteriaId\":\"8B0A7E0E-F6D8-45DB-8CD9-01839FE40A6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.19\",\"versionEndExcluding\":\"7.0.2\",\"matchCriteriaId\":\"1BD58F1E-7C20-4C0D-92A2-FAC5CBFBE8A8\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/151b1799861fde38087c08f613abc2843ef597b0\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/325d4ac11f526cb8964cff14548ccf02d8c756d8\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/90089584b2e25c4510b7b987387b4405f0673ece\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/95e5aa3c3261da8c95b27d7aecf8ee39b9f86a4c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d07b26f39246a82399661936dd0c853983cfade7\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]}]}}"
}
}
CNVD-2026-20424
Vulnerability from cnvd - Published: 2026-05-15厂商已发布了漏洞修复程序,请及时关注更新: https://www.kernel.org/category/releases.html
| Name | ['Linux Linux kernel >=6.13,<6.18.25', 'Linux Linux kernel >=6.19,<7.0.2', 'Linux Linux kernel >=5.15,<6.12.84'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2026-31712",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2026-31712"
}
},
"description": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\n\nLinux kernel\u5b58\u5728\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8eksmbd\u7684smb_check_perm_dacl()\u51fd\u6570\u4e2dACE\u5927\u5c0f\u9a8c\u8bc1\u4e0d\u8db3\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u8d8a\u754c\u8bfb\u53d6\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.kernel.org/category/releases.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2026-20424",
"openTime": "2026-05-15",
"patchDescription": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux kernel\u5b58\u5728\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8eksmbd\u7684smb_check_perm_dacl()\u51fd\u6570\u4e2dACE\u5927\u5c0f\u9a8c\u8bc1\u4e0d\u8db3\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u8d8a\u754c\u8bfb\u53d6\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Linux kernel smb_check_perm_dacl\u51fd\u6570\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Linux Linux kernel \u003e=6.13\uff0c\u003c6.18.25",
"Linux Linux kernel \u003e=6.19\uff0c\u003c7.0.2",
"Linux Linux kernel \u003e=5.15\uff0c\u003c6.12.84"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2026-31712",
"serverity": "\u9ad8",
"submitTime": "2026-05-11",
"title": "Linux kernel smb_check_perm_dacl\u51fd\u6570\u8d8a\u754c\u8bfb\u53d6\u6f0f\u6d1e"
}
FKIE_CVE-2026-31712
Vulnerability from fkie_nvd - Published: 2026-05-01 14:16 - Updated: 2026-05-17 16:16| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04651641-C387-4546-B02F-17BA989CC253",
"versionEndExcluding": "6.12.84",
"versionStartIncluding": "5.15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B0A7E0E-F6D8-45DB-8CD9-01839FE40A6C",
"versionEndExcluding": "6.18.25",
"versionStartIncluding": "6.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1BD58F1E-7C20-4C0D-92A2-FAC5CBFBE8A8",
"versionEndExcluding": "7.0.2",
"versionStartIncluding": "6.19",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: require minimum ACE size in smb_check_perm_dacl()\n\nBoth ACE-walk loops in smb_check_perm_dacl() only guard against an\nunder-sized remaining buffer, not against an ACE whose declared\n`ace-\u003esize` is smaller than the struct it claims to describe:\n\n if (offsetof(struct smb_ace, access_req) \u003e aces_size)\n break;\n ace_size = le16_to_cpu(ace-\u003esize);\n if (ace_size \u003e aces_size)\n break;\n\nThe first check only requires the 4-byte ACE header to be in bounds;\nit does not require access_req (4 bytes at offset 4) to be readable.\nAn attacker who has set a crafted DACL on a file they own can declare\nace-\u003esize == 4 with aces_size == 4, pass both checks, and then\n\n granted |= le32_to_cpu(ace-\u003eaccess_req); /* upper loop */\n compare_sids(\u0026sid, \u0026ace-\u003esid); /* lower loop */\n\nreads access_req at offset 4 (OOB by up to 4 bytes) and ace-\u003esid at\noffset 8 (OOB by up to CIFS_SID_BASE_SIZE + SID_MAX_SUB_AUTHORITIES\n* 4 bytes).\n\nTighten both loops to require\n\n ace_size \u003e= offsetof(struct smb_ace, sid) + CIFS_SID_BASE_SIZE\n\nwhich is the smallest valid on-wire ACE layout (4-byte header +\n4-byte access_req + 8-byte sid base with zero sub-auths). Also\nreject ACEs whose sid.num_subauth exceeds SID_MAX_SUB_AUTHORITIES\nbefore letting compare_sids() dereference sub_auth[] entries.\n\nparse_sec_desc() already enforces an equivalent check (lines 441-448);\nsmb_check_perm_dacl() simply grew weaker validation over time.\n\nReachability: authenticated SMB client with permission to set an ACL\non a file. On a subsequent CREATE against that file, the kernel\nwalks the stored DACL via smb_check_perm_dacl() and triggers the\nOOB read. Not pre-auth, and the OOB read is not reflected to the\nattacker, but KASAN reports and kernel state corruption are\npossible."
}
],
"id": "CVE-2026-31712",
"lastModified": "2026-05-17T16:16:16.050",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5,
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"type": "Secondary"
}
]
},
"published": "2026-05-01T14:16:21.270",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/151b1799861fde38087c08f613abc2843ef597b0"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/325d4ac11f526cb8964cff14548ccf02d8c756d8"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/90089584b2e25c4510b7b987387b4405f0673ece"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/95e5aa3c3261da8c95b27d7aecf8ee39b9f86a4c"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/d07b26f39246a82399661936dd0c853983cfade7"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-59CP-8V32-7335
Vulnerability from github – Published: 2026-05-01 15:30 – Updated: 2026-05-17 18:30In the Linux kernel, the following vulnerability has been resolved:
ksmbd: require minimum ACE size in smb_check_perm_dacl()
Both ACE-walk loops in smb_check_perm_dacl() only guard against an
under-sized remaining buffer, not against an ACE whose declared
ace->size is smaller than the struct it claims to describe:
if (offsetof(struct smb_ace, access_req) > aces_size) break; ace_size = le16_to_cpu(ace->size); if (ace_size > aces_size) break;
The first check only requires the 4-byte ACE header to be in bounds; it does not require access_req (4 bytes at offset 4) to be readable. An attacker who has set a crafted DACL on a file they own can declare ace->size == 4 with aces_size == 4, pass both checks, and then
granted |= le32_to_cpu(ace->access_req); / upper loop / compare_sids(&sid, &ace->sid); / lower loop /
reads access_req at offset 4 (OOB by up to 4 bytes) and ace->sid at offset 8 (OOB by up to CIFS_SID_BASE_SIZE + SID_MAX_SUB_AUTHORITIES * 4 bytes).
Tighten both loops to require
ace_size >= offsetof(struct smb_ace, sid) + CIFS_SID_BASE_SIZE
which is the smallest valid on-wire ACE layout (4-byte header + 4-byte access_req + 8-byte sid base with zero sub-auths). Also reject ACEs whose sid.num_subauth exceeds SID_MAX_SUB_AUTHORITIES before letting compare_sids() dereference sub_auth[] entries.
parse_sec_desc() already enforces an equivalent check (lines 441-448); smb_check_perm_dacl() simply grew weaker validation over time.
Reachability: authenticated SMB client with permission to set an ACL on a file. On a subsequent CREATE against that file, the kernel walks the stored DACL via smb_check_perm_dacl() and triggers the OOB read. Not pre-auth, and the OOB read is not reflected to the attacker, but KASAN reports and kernel state corruption are possible.
{
"affected": [],
"aliases": [
"CVE-2026-31712"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-05-01T14:16:21Z",
"severity": "HIGH"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: require minimum ACE size in smb_check_perm_dacl()\n\nBoth ACE-walk loops in smb_check_perm_dacl() only guard against an\nunder-sized remaining buffer, not against an ACE whose declared\n`ace-\u003esize` is smaller than the struct it claims to describe:\n\n if (offsetof(struct smb_ace, access_req) \u003e aces_size)\n break;\n ace_size = le16_to_cpu(ace-\u003esize);\n if (ace_size \u003e aces_size)\n break;\n\nThe first check only requires the 4-byte ACE header to be in bounds;\nit does not require access_req (4 bytes at offset 4) to be readable.\nAn attacker who has set a crafted DACL on a file they own can declare\nace-\u003esize == 4 with aces_size == 4, pass both checks, and then\n\n granted |= le32_to_cpu(ace-\u003eaccess_req); /* upper loop */\n compare_sids(\u0026sid, \u0026ace-\u003esid); /* lower loop */\n\nreads access_req at offset 4 (OOB by up to 4 bytes) and ace-\u003esid at\noffset 8 (OOB by up to CIFS_SID_BASE_SIZE + SID_MAX_SUB_AUTHORITIES\n* 4 bytes).\n\nTighten both loops to require\n\n ace_size \u003e= offsetof(struct smb_ace, sid) + CIFS_SID_BASE_SIZE\n\nwhich is the smallest valid on-wire ACE layout (4-byte header +\n4-byte access_req + 8-byte sid base with zero sub-auths). Also\nreject ACEs whose sid.num_subauth exceeds SID_MAX_SUB_AUTHORITIES\nbefore letting compare_sids() dereference sub_auth[] entries.\n\nparse_sec_desc() already enforces an equivalent check (lines 441-448);\nsmb_check_perm_dacl() simply grew weaker validation over time.\n\nReachability: authenticated SMB client with permission to set an ACL\non a file. On a subsequent CREATE against that file, the kernel\nwalks the stored DACL via smb_check_perm_dacl() and triggers the\nOOB read. Not pre-auth, and the OOB read is not reflected to the\nattacker, but KASAN reports and kernel state corruption are\npossible.",
"id": "GHSA-59cp-8v32-7335",
"modified": "2026-05-17T18:30:27Z",
"published": "2026-05-01T15:30:33Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-31712"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/151b1799861fde38087c08f613abc2843ef597b0"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/325d4ac11f526cb8964cff14548ccf02d8c756d8"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/90089584b2e25c4510b7b987387b4405f0673ece"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/95e5aa3c3261da8c95b27d7aecf8ee39b9f86a4c"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/d07b26f39246a82399661936dd0c853983cfade7"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"type": "CVSS_V3"
}
]
}
MSRC_CVE-2026-31712
Vulnerability from csaf_microsoft - Published: 2026-05-02 00:00 - Updated: 2026-05-17 14:42| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17084-4 | — |
None Available
|
|
| Unresolved product id: 17084-2 | — |
None Available
|
|
| Unresolved product id: 17084-3 | — |
None Available
|
|
| Unresolved product id: 17084-1 | — |
None Available
|
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-31712 ksmbd: require minimum ACE size in smb_check_perm_dacl() - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-31712.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "ksmbd: require minimum ACE size in smb_check_perm_dacl()",
"tracking": {
"current_release_date": "2026-05-17T14:42:32.000Z",
"generator": {
"date": "2026-05-18T07:35:12.554Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-31712",
"initial_release_date": "2026-05-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-05-02T01:03:15.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-05-04T14:39:23.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2026-05-06T14:47:35.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
},
{
"date": "2026-05-11T01:41:15.000Z",
"legacy_version": "4",
"number": "4",
"summary": "Information published."
},
{
"date": "2026-05-17T14:42:32.000Z",
"legacy_version": "5",
"number": "5",
"summary": "Information published."
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "azl3 kernel 0:6.6.134.1-2.azl3",
"product": {
"name": "azl3 kernel 0:6.6.134.1-2.azl3",
"product_id": "4"
}
},
{
"category": "product_version_range",
"name": "azl3 kernel 0:6.6.138.1-1.azl3",
"product": {
"name": "azl3 kernel 0:6.6.138.1-1.azl3",
"product_id": "2"
}
},
{
"category": "product_version_range",
"name": "azl3 kernel 0:6.6.137.1-2.azl3",
"product": {
"name": "azl3 kernel 0:6.6.137.1-2.azl3",
"product_id": "3"
}
},
{
"category": "product_version_range",
"name": "azl3 kernel 0:6.6.139.1-1.azl3",
"product": {
"name": "azl3 kernel 0:6.6.139.1-1.azl3",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "kernel"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 0:6.6.134.1-2.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-4"
},
"product_reference": "4",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 0:6.6.138.1-1.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 0:6.6.137.1-2.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 0:6.6.139.1-1.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-31712",
"notes": [
{
"category": "general",
"text": "Linux",
"title": "Assigning CNA"
}
],
"product_status": {
"known_affected": [
"17084-4",
"17084-2",
"17084-3",
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-31712 ksmbd: require minimum ACE size in smb_check_perm_dacl() - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-31712.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2026-05-02T01:03:15.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-4"
]
},
{
"category": "none_available",
"date": "2026-05-02T01:03:15.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-2"
]
},
{
"category": "none_available",
"date": "2026-05-02T01:03:15.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-3"
]
},
{
"category": "none_available",
"date": "2026-05-02T01:03:15.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-1"
]
}
],
"title": "ksmbd: require minimum ACE size in smb_check_perm_dacl()"
}
]
}
OPENSUSE-SU-2026:10793-1
Vulnerability from csaf_opensuse - Published: 2026-05-16 00:00 - Updated: 2026-05-16 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kernel-devel-7.0.7-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kernel-devel-7.0.7-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10793",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10793-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31694 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31694/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31696 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31696/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31697 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31697/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31698 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31698/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31699 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31699/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31700 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31700/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31701 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31701/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31702 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31703 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31703/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31704 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31704/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31705 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31705/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31706 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31706/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31707 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31707/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31708 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31708/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31709 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31709/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31710 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31711 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31712 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31712/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31713 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31713/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31714 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31715 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31716 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31716/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31717 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31717/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31718 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31718/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-31719 page",
"url": "https://www.suse.com/security/cve/CVE-2026-31719/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43058 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43058/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43071 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43071/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43072 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43072/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43073 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43284 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43284/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43348 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43348/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43349 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43349/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43350 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43350/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43490 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43500 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43500/"
}
],
"title": "kernel-devel-7.0.7-1.1 on GA media",
"tracking": {
"current_release_date": "2026-05-16T00:00:00Z",
"generator": {
"date": "2026-05-16T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10793-1",
"initial_release_date": "2026-05-16T00:00:00Z",
"revision_history": [
{
"date": "2026-05-16T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-7.0.7-1.1.aarch64",
"product": {
"name": "kernel-devel-7.0.7-1.1.aarch64",
"product_id": "kernel-devel-7.0.7-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-macros-7.0.7-1.1.aarch64",
"product": {
"name": "kernel-macros-7.0.7-1.1.aarch64",
"product_id": "kernel-macros-7.0.7-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-7.0.7-1.1.aarch64",
"product": {
"name": "kernel-source-7.0.7-1.1.aarch64",
"product_id": "kernel-source-7.0.7-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-7.0.7-1.1.aarch64",
"product": {
"name": "kernel-source-vanilla-7.0.7-1.1.aarch64",
"product_id": "kernel-source-vanilla-7.0.7-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-7.0.7-1.1.ppc64le",
"product": {
"name": "kernel-devel-7.0.7-1.1.ppc64le",
"product_id": "kernel-devel-7.0.7-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-macros-7.0.7-1.1.ppc64le",
"product": {
"name": "kernel-macros-7.0.7-1.1.ppc64le",
"product_id": "kernel-macros-7.0.7-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-7.0.7-1.1.ppc64le",
"product": {
"name": "kernel-source-7.0.7-1.1.ppc64le",
"product_id": "kernel-source-7.0.7-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-7.0.7-1.1.ppc64le",
"product": {
"name": "kernel-source-vanilla-7.0.7-1.1.ppc64le",
"product_id": "kernel-source-vanilla-7.0.7-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-7.0.7-1.1.s390x",
"product": {
"name": "kernel-devel-7.0.7-1.1.s390x",
"product_id": "kernel-devel-7.0.7-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-macros-7.0.7-1.1.s390x",
"product": {
"name": "kernel-macros-7.0.7-1.1.s390x",
"product_id": "kernel-macros-7.0.7-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-7.0.7-1.1.s390x",
"product": {
"name": "kernel-source-7.0.7-1.1.s390x",
"product_id": "kernel-source-7.0.7-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-7.0.7-1.1.s390x",
"product": {
"name": "kernel-source-vanilla-7.0.7-1.1.s390x",
"product_id": "kernel-source-vanilla-7.0.7-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-7.0.7-1.1.x86_64",
"product": {
"name": "kernel-devel-7.0.7-1.1.x86_64",
"product_id": "kernel-devel-7.0.7-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-macros-7.0.7-1.1.x86_64",
"product": {
"name": "kernel-macros-7.0.7-1.1.x86_64",
"product_id": "kernel-macros-7.0.7-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-7.0.7-1.1.x86_64",
"product": {
"name": "kernel-source-7.0.7-1.1.x86_64",
"product_id": "kernel-source-7.0.7-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-7.0.7-1.1.x86_64",
"product": {
"name": "kernel-source-vanilla-7.0.7-1.1.x86_64",
"product_id": "kernel-source-vanilla-7.0.7-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-7.0.7-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64"
},
"product_reference": "kernel-devel-7.0.7-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-7.0.7-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le"
},
"product_reference": "kernel-devel-7.0.7-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-7.0.7-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x"
},
"product_reference": "kernel-devel-7.0.7-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-7.0.7-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64"
},
"product_reference": "kernel-devel-7.0.7-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-7.0.7-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64"
},
"product_reference": "kernel-macros-7.0.7-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-7.0.7-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le"
},
"product_reference": "kernel-macros-7.0.7-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-7.0.7-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x"
},
"product_reference": "kernel-macros-7.0.7-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-7.0.7-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64"
},
"product_reference": "kernel-macros-7.0.7-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-7.0.7-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64"
},
"product_reference": "kernel-source-7.0.7-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-7.0.7-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le"
},
"product_reference": "kernel-source-7.0.7-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-7.0.7-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x"
},
"product_reference": "kernel-source-7.0.7-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-7.0.7-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64"
},
"product_reference": "kernel-source-7.0.7-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-7.0.7-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64"
},
"product_reference": "kernel-source-vanilla-7.0.7-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-7.0.7-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le"
},
"product_reference": "kernel-source-vanilla-7.0.7-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-7.0.7-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x"
},
"product_reference": "kernel-source-vanilla-7.0.7-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-7.0.7-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
},
"product_reference": "kernel-source-vanilla-7.0.7-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-31694",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31694"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfuse: reject oversized dirents in page cache\n\nfuse_add_dirent_to_cache() computes a serialized dirent size from the\nserver-controlled namelen field and copies the dirent into a single\npage-cache page. The existing logic only checks whether the dirent fits\nin the remaining space of the current page and advances to a fresh page\nif not. It never checks whether the dirent itself exceeds PAGE_SIZE.\n\nAs a result, a malicious FUSE server can return a dirent with\nnamelen=4095, producing a serialized record size of 4120 bytes. On 4 KiB\npage systems this causes memcpy() to overflow the cache page by 24 bytes\ninto the following kernel page.\n\nReject dirents that cannot fit in a single page before copying them into\nthe readdir cache.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31694",
"url": "https://www.suse.com/security/cve/CVE-2026-31694"
},
{
"category": "external",
"summary": "SUSE Bug 1263901 for CVE-2026-31694",
"url": "https://bugzilla.suse.com/1263901"
},
{
"category": "external",
"summary": "SUSE Bug 1263902 for CVE-2026-31694",
"url": "https://bugzilla.suse.com/1263902"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-31694"
},
{
"cve": "CVE-2026-31696",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31696"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrxrpc: Fix missing validation of ticket length in non-XDR key preparsing\n\nIn rxrpc_preparse(), there are two paths for parsing key payloads: the\nXDR path (for large payloads) and the non-XDR path (for payloads \u003c= 28\nbytes). While the XDR path (rxrpc_preparse_xdr_rxkad()) correctly\nvalidates the ticket length against AFSTOKEN_RK_TIX_MAX, the non-XDR\npath fails to do so.\n\nThis allows an unprivileged user to provide a very large ticket length.\nWhen this key is later read via rxrpc_read(), the total\ntoken size (toksize) calculation results in a value that exceeds\nAFSTOKEN_LENGTH_MAX, triggering a WARN_ON().\n\n[ 2001.302904] WARNING: CPU: 2 PID: 2108 at net/rxrpc/key.c:778 rxrpc_read+0x109/0x5c0 [rxrpc]\n\nFix this by adding a check in the non-XDR parsing path of rxrpc_preparse()\nto ensure the ticket length does not exceed AFSTOKEN_RK_TIX_MAX,\nbringing it into parity with the XDR parsing logic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31696",
"url": "https://www.suse.com/security/cve/CVE-2026-31696"
},
{
"category": "external",
"summary": "SUSE Bug 1263900 for CVE-2026-31696",
"url": "https://bugzilla.suse.com/1263900"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-31696"
},
{
"cve": "CVE-2026-31697",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31697"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: ccp: Don\u0027t attempt to copy ID to userspace if PSP command failed\n\nWhen retrieving the ID for the CPU, don\u0027t attempt to copy the ID blob to\nuserspace if the firmware command failed. If the failure was due to an\ninvalid length, i.e. the userspace buffer+length was too small, copying\nthe number of bytes _firmware_ requires will overflow the kernel-allocated\nbuffer and leak data to userspace.\n\n BUG: KASAN: slab-out-of-bounds in instrument_copy_to_user ../include/linux/instrumented.h:129 [inline]\n BUG: KASAN: slab-out-of-bounds in _inline_copy_to_user ../include/linux/uaccess.h:205 [inline]\n BUG: KASAN: slab-out-of-bounds in _copy_to_user+0x66/0xa0 ../lib/usercopy.c:26\n Read of size 64 at addr ffff8881867f5960 by task syz.0.906/24388\n\n CPU: 130 UID: 0 PID: 24388 Comm: syz.0.906 Tainted: G U O 7.0.0-smp-DEV #28 PREEMPTLAZY\n Tainted: [U]=USER, [O]=OOT_MODULE\n Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 12.62.0-0 11/19/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xc5/0x110 ../lib/dump_stack.c:120\n print_address_description ../mm/kasan/report.c:378 [inline]\n print_report+0xbc/0x260 ../mm/kasan/report.c:482\n kasan_report+0xa2/0xe0 ../mm/kasan/report.c:595\n check_region_inline ../mm/kasan/generic.c:-1 [inline]\n kasan_check_range+0x264/0x2c0 ../mm/kasan/generic.c:200\n instrument_copy_to_user ../include/linux/instrumented.h:129 [inline]\n _inline_copy_to_user ../include/linux/uaccess.h:205 [inline]\n _copy_to_user+0x66/0xa0 ../lib/usercopy.c:26\n copy_to_user ../include/linux/uaccess.h:236 [inline]\n sev_ioctl_do_get_id2+0x361/0x490 ../drivers/crypto/ccp/sev-dev.c:2222\n sev_ioctl+0x25f/0x490 ../drivers/crypto/ccp/sev-dev.c:2575\n vfs_ioctl ../fs/ioctl.c:51 [inline]\n __do_sys_ioctl ../fs/ioctl.c:597 [inline]\n __se_sys_ioctl+0x11d/0x1b0 ../fs/ioctl.c:583\n do_syscall_x64 ../arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xe0/0x800 ../arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nWARN if the driver says the command succeeded, but the firmware error code\nsays otherwise, as __sev_do_cmd_locked() is expected to return -EIO on any\nfirwmware error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31697",
"url": "https://www.suse.com/security/cve/CVE-2026-31697"
},
{
"category": "external",
"summary": "SUSE Bug 1264116 for CVE-2026-31697",
"url": "https://bugzilla.suse.com/1264116"
},
{
"category": "external",
"summary": "SUSE Bug 1264144 for CVE-2026-31697",
"url": "https://bugzilla.suse.com/1264144"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-31697"
},
{
"cve": "CVE-2026-31698",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31698"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: ccp: Don\u0027t attempt to copy PDH cert to userspace if PSP command failed\n\nWhen retrieving the PDH cert, don\u0027t attempt to copy the blobs to userspace\nif the firmware command failed. If the failure was due to an invalid\nlength, i.e. the userspace buffer+length was too small, copying the number\nof bytes _firmware_ requires will overflow the kernel-allocated buffer and\nleak data to userspace.\n\n BUG: KASAN: slab-out-of-bounds in instrument_copy_to_user ../include/linux/instrumented.h:129 [inline]\n BUG: KASAN: slab-out-of-bounds in _inline_copy_to_user ../include/linux/uaccess.h:205 [inline]\n BUG: KASAN: slab-out-of-bounds in _copy_to_user+0x66/0xa0 ../lib/usercopy.c:26\n Read of size 2084 at addr ffff8885c4ab8aa0 by task syz.0.186/21033\n\n CPU: 51 UID: 0 PID: 21033 Comm: syz.0.186 Tainted: G U O 7.0.0-smp-DEV #28 PREEMPTLAZY\n Tainted: [U]=USER, [O]=OOT_MODULE\n Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.84.12-0 11/17/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xc5/0x110 ../lib/dump_stack.c:120\n print_address_description ../mm/kasan/report.c:378 [inline]\n print_report+0xbc/0x260 ../mm/kasan/report.c:482\n kasan_report+0xa2/0xe0 ../mm/kasan/report.c:595\n check_region_inline ../mm/kasan/generic.c:-1 [inline]\n kasan_check_range+0x264/0x2c0 ../mm/kasan/generic.c:200\n instrument_copy_to_user ../include/linux/instrumented.h:129 [inline]\n _inline_copy_to_user ../include/linux/uaccess.h:205 [inline]\n _copy_to_user+0x66/0xa0 ../lib/usercopy.c:26\n copy_to_user ../include/linux/uaccess.h:236 [inline]\n sev_ioctl_do_pdh_export+0x3d3/0x7c0 ../drivers/crypto/ccp/sev-dev.c:2347\n sev_ioctl+0x2a2/0x490 ../drivers/crypto/ccp/sev-dev.c:2568\n vfs_ioctl ../fs/ioctl.c:51 [inline]\n __do_sys_ioctl ../fs/ioctl.c:597 [inline]\n __se_sys_ioctl+0x11d/0x1b0 ../fs/ioctl.c:583\n do_syscall_x64 ../arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xe0/0x800 ../arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nWARN if the driver says the command succeeded, but the firmware error code\nsays otherwise, as __sev_do_cmd_locked() is expected to return -EIO on any\nfirwmware error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31698",
"url": "https://www.suse.com/security/cve/CVE-2026-31698"
},
{
"category": "external",
"summary": "SUSE Bug 1263880 for CVE-2026-31698",
"url": "https://bugzilla.suse.com/1263880"
},
{
"category": "external",
"summary": "SUSE Bug 1263929 for CVE-2026-31698",
"url": "https://bugzilla.suse.com/1263929"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-31698"
},
{
"cve": "CVE-2026-31699",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31699"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: ccp: Don\u0027t attempt to copy CSR to userspace if PSP command failed\n\nWhen retrieving the PEK CSR, don\u0027t attempt to copy the blob to userspace\nif the firmware command failed. If the failure was due to an invalid\nlength, i.e. the userspace buffer+length was too small, copying the number\nof bytes _firmware_ requires will overflow the kernel-allocated buffer and\nleak data to userspace.\n\n BUG: KASAN: slab-out-of-bounds in instrument_copy_to_user ../include/linux/instrumented.h:129 [inline]\n BUG: KASAN: slab-out-of-bounds in _inline_copy_to_user ../include/linux/uaccess.h:205 [inline]\n BUG: KASAN: slab-out-of-bounds in _copy_to_user+0x66/0xa0 ../lib/usercopy.c:26\n Read of size 2084 at addr ffff898144612e20 by task syz.9.219/21405\n\n CPU: 14 UID: 0 PID: 21405 Comm: syz.9.219 Tainted: G U O 7.0.0-smp-DEV #28 PREEMPTLAZY\n Tainted: [U]=USER, [O]=OOT_MODULE\n Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 12.62.0-0 11/19/2025\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xc5/0x110 ../lib/dump_stack.c:120\n print_address_description ../mm/kasan/report.c:378 [inline]\n print_report+0xbc/0x260 ../mm/kasan/report.c:482\n kasan_report+0xa2/0xe0 ../mm/kasan/report.c:595\n check_region_inline ../mm/kasan/generic.c:-1 [inline]\n kasan_check_range+0x264/0x2c0 ../mm/kasan/generic.c:200\n instrument_copy_to_user ../include/linux/instrumented.h:129 [inline]\n _inline_copy_to_user ../include/linux/uaccess.h:205 [inline]\n _copy_to_user+0x66/0xa0 ../lib/usercopy.c:26\n copy_to_user ../include/linux/uaccess.h:236 [inline]\n sev_ioctl_do_pek_csr+0x31f/0x590 ../drivers/crypto/ccp/sev-dev.c:1872\n sev_ioctl+0x3a4/0x490 ../drivers/crypto/ccp/sev-dev.c:2562\n vfs_ioctl ../fs/ioctl.c:51 [inline]\n __do_sys_ioctl ../fs/ioctl.c:597 [inline]\n __se_sys_ioctl+0x11d/0x1b0 ../fs/ioctl.c:583\n do_syscall_x64 ../arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xe0/0x800 ../arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n \u003c/TASK\u003e\n\nWARN if the driver says the command succeeded, but the firmware error code\nsays otherwise, as __sev_do_cmd_locked() is expected to return -EIO on any\nfirwmware error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31699",
"url": "https://www.suse.com/security/cve/CVE-2026-31699"
},
{
"category": "external",
"summary": "SUSE Bug 1263879 for CVE-2026-31699",
"url": "https://bugzilla.suse.com/1263879"
},
{
"category": "external",
"summary": "SUSE Bug 1263928 for CVE-2026-31699",
"url": "https://bugzilla.suse.com/1263928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-31699"
},
{
"cve": "CVE-2026-31700",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31700"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/packet: fix TOCTOU race on mmap\u0027d vnet_hdr in tpacket_snd()\n\nIn tpacket_snd(), when PACKET_VNET_HDR is enabled, vnet_hdr points\ndirectly into the mmap\u0027d TX ring buffer shared with userspace. The\nkernel validates the header via __packet_snd_vnet_parse() but then\nre-reads all fields later in virtio_net_hdr_to_skb(). A concurrent\nuserspace thread can modify the vnet_hdr fields between validation\nand use, bypassing all safety checks.\n\nThe non-TPACKET path (packet_snd()) already correctly copies vnet_hdr\nto a stack-local variable. All other vnet_hdr consumers in the kernel\n(tun.c, tap.c, virtio_net.c) also use stack copies. The TPACKET TX\npath is the only caller of virtio_net_hdr_to_skb() that reads directly\nfrom user-controlled shared memory.\n\nFix this by copying vnet_hdr from the mmap\u0027d ring buffer to a\nstack-local variable before validation and use, consistent with the\napproach used in packet_snd() and all other callers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31700",
"url": "https://www.suse.com/security/cve/CVE-2026-31700"
},
{
"category": "external",
"summary": "SUSE Bug 1263882 for CVE-2026-31700",
"url": "https://bugzilla.suse.com/1263882"
},
{
"category": "external",
"summary": "SUSE Bug 1263927 for CVE-2026-31700",
"url": "https://bugzilla.suse.com/1263927"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-31700"
},
{
"cve": "CVE-2026-31701",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31701"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: caiaq: take a reference on the USB device in create_card()\n\nThe caiaq driver stores a pointer to the parent USB device in\ncdev-\u003echip.dev but never takes a reference on it. The card\u0027s\nprivate_free callback, snd_usb_caiaq_card_free(), can run\nasynchronously via snd_card_free_when_closed() after the USB\ndevice has already been disconnected and freed, so any access to\ncdev-\u003echip.dev in that path dereferences a freed usb_device.\n\nOn top of the refcounting issue, the current card_free implementation\ncalls usb_reset_device(cdev-\u003echip.dev). A reset in a free callback\nis inappropriate: the device is going away, the call takes the\ndevice lock in a teardown context, and the reset races with the\ndisconnect path that the callback is already cleaning up after.\n\nTake a reference on the USB device in create_card() with\nusb_get_dev(), drop it with usb_put_dev() in the free callback,\nand remove the usb_reset_device() call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31701",
"url": "https://www.suse.com/security/cve/CVE-2026-31701"
},
{
"category": "external",
"summary": "SUSE Bug 1263876 for CVE-2026-31701",
"url": "https://bugzilla.suse.com/1263876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-31701"
},
{
"cve": "CVE-2026-31702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31702"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix use-after-free of sbi in f2fs_compress_write_end_io()\n\nIn f2fs_compress_write_end_io(), dec_page_count(sbi, type) can bring\nthe F2FS_WB_CP_DATA counter to zero, unblocking\nf2fs_wait_on_all_pages() in f2fs_put_super() on a concurrent unmount\nCPU. The unmount path then proceeds to call\nf2fs_destroy_page_array_cache(sbi), which destroys\nsbi-\u003epage_array_slab via kmem_cache_destroy(), and eventually\nkfree(sbi). Meanwhile, the bio completion callback is still executing:\nwhen it reaches page_array_free(sbi, ...), it dereferences\nsbi-\u003epage_array_slab - a destroyed slab cache - to call\nkmem_cache_free(), causing a use-after-free.\n\nThis is the same class of bug as CVE-2026-23234 (which fixed the\nequivalent race in f2fs_write_end_io() in data.c), but in the\ncompressed writeback completion path that was not covered by that fix.\n\nFix this by moving dec_page_count() to after page_array_free(), so\nthat all sbi accesses complete before the counter decrement that can\nunblock unmount. For non-last folios (where atomic_dec_return on\ncic-\u003epending_pages is nonzero), dec_page_count is called immediately\nbefore returning - page_array_free is not reached on this path, so\nthere is no post-decrement sbi access. For the last folio,\npage_array_free runs while the F2FS_WB_CP_DATA counter is still\nnonzero (this folio has not yet decremented it), keeping sbi alive,\nand dec_page_count runs as the final operation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31702",
"url": "https://www.suse.com/security/cve/CVE-2026-31702"
},
{
"category": "external",
"summary": "SUSE Bug 1263884 for CVE-2026-31702",
"url": "https://bugzilla.suse.com/1263884"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-31702"
},
{
"cve": "CVE-2026-31703",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31703"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwriteback: Fix use after free in inode_switch_wbs_work_fn()\n\ninode_switch_wbs_work_fn() has a loop like:\n\n wb_get(new_wb);\n while (1) {\n list = llist_del_all(\u0026new_wb-\u003eswitch_wbs_ctxs);\n /* Nothing to do? */\n if (!list)\n break;\n ... process the items ...\n }\n\nNow adding of items to the list looks like:\n\nwb_queue_isw()\n if (llist_add(\u0026isw-\u003elist, \u0026wb-\u003eswitch_wbs_ctxs))\n queue_work(isw_wq, \u0026wb-\u003eswitch_work);\n\nBecause inode_switch_wbs_work_fn() loops when processing isw items, it\ncan happen that wb-\u003eswitch_work is pending while wb-\u003eswitch_wbs_ctxs is\nempty. This is a problem because in that case wb can get freed (no isw\nitems -\u003e no wb reference) while the work is still pending causing\nuse-after-free issues.\n\nWe cannot just fix this by cancelling work when freeing wb because that\ncould still trigger problematic 0 -\u003e 1 transitions on wb refcount due to\nwb_get() in inode_switch_wbs_work_fn(). It could be all handled with\nmore careful code but that seems unnecessarily complex so let\u0027s avoid\nthat until it is proven that the looping actually brings practical\nbenefit. Just remove the loop from inode_switch_wbs_work_fn() instead.\nThat way when wb_queue_isw() queues work, we are guaranteed we have\nadded the first item to wb-\u003eswitch_wbs_ctxs and nobody is going to\nremove it (and drop the wb reference it holds) until the queued work\nruns.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31703",
"url": "https://www.suse.com/security/cve/CVE-2026-31703"
},
{
"category": "external",
"summary": "SUSE Bug 1263883 for CVE-2026-31703",
"url": "https://bugzilla.suse.com/1263883"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-31703"
},
{
"cve": "CVE-2026-31704",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31704"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: use check_add_overflow() to prevent u16 DACL size overflow\n\nset_posix_acl_entries_dacl() and set_ntacl_dacl() accumulate ACE sizes\nin u16 variables. When a file has many POSIX ACL entries, the\naccumulated size can wrap past 65535, causing the pointer arithmetic\n(char *)pndace + *size to land within already-written ACEs. Subsequent\nwrites then overwrite earlier entries, and pndacl-\u003esize gets a\ntruncated value.\n\nUse check_add_overflow() at each accumulation point to detect the\nwrap before it corrupts the buffer, consistent with existing\ncheck_mul_overflow() usage elsewhere in smbacl.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31704",
"url": "https://www.suse.com/security/cve/CVE-2026-31704"
},
{
"category": "external",
"summary": "SUSE Bug 1263881 for CVE-2026-31704",
"url": "https://bugzilla.suse.com/1263881"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-31704"
},
{
"cve": "CVE-2026-31705",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31705"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix out-of-bounds write in smb2_get_ea() EA alignment\n\nsmb2_get_ea() applies 4-byte alignment padding via memset() after\nwriting each EA entry. The bounds check on buf_free_len is performed\nbefore the value memcpy, but the alignment memset fires unconditionally\nafterward with no check on remaining space.\n\nWhen the EA value exactly fills the remaining buffer (buf_free_len == 0\nafter value subtraction), the alignment memset writes 1-3 NUL bytes\npast the buf_free_len boundary. In compound requests where the response\nbuffer is shared across commands, the first command (e.g., READ) can\nconsume most of the buffer, leaving a tight remainder for the QUERY_INFO\nEA response. The alignment memset then overwrites past the physical\nkvmalloc allocation into adjacent kernel heap memory.\n\nAdd a bounds check before the alignment memset to ensure buf_free_len\ncan accommodate the padding bytes.\n\nThis is the same bug pattern fixed by commit beef2634f81f (\"ksmbd: fix\npotencial OOB in get_file_all_info() for compound requests\") and\ncommit fda9522ed6af (\"ksmbd: fix OOB write in QUERY_INFO for compound\nrequests\"), both of which added bounds checks before unconditional\nwrites in QUERY_INFO response handlers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31705",
"url": "https://www.suse.com/security/cve/CVE-2026-31705"
},
{
"category": "external",
"summary": "SUSE Bug 1263878 for CVE-2026-31705",
"url": "https://bugzilla.suse.com/1263878"
},
{
"category": "external",
"summary": "SUSE Bug 1263926 for CVE-2026-31705",
"url": "https://bugzilla.suse.com/1263926"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-31705"
},
{
"cve": "CVE-2026-31706",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31706"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: validate num_aces and harden ACE walk in smb_inherit_dacl()\n\nsmb_inherit_dacl() trusts the on-disk num_aces value from the parent\ndirectory\u0027s DACL xattr and uses it to size a heap allocation:\n\n aces_base = kmalloc(sizeof(struct smb_ace) * num_aces * 2, ...);\n\nnum_aces is a u16 read from le16_to_cpu(parent_pdacl-\u003enum_aces)\nwithout checking that it is consistent with the declared pdacl_size.\nAn authenticated client whose parent directory\u0027s security.NTACL is\ntampered (e.g. via offline xattr corruption or a concurrent path that\nbypasses parse_dacl()) can present num_aces = 65535 with minimal\nactual ACE data. This causes a ~8 MB allocation (not kzalloc, so\nuninitialized) that the subsequent loop only partially populates, and\nmay also overflow the three-way size_t multiply on 32-bit kernels.\n\nAdditionally, the ACE walk loop uses the weaker\noffsetof(struct smb_ace, access_req) minimum size check rather than\nthe minimum valid on-wire ACE size, and does not reject ACEs whose\ndeclared size is below the minimum.\n\nReproduced on UML + KASAN + LOCKDEP against the real ksmbd code path.\nA legitimate mount.cifs client creates a parent directory over SMB\n(ksmbd writes a valid security.NTACL xattr), then the NTACL blob on\nthe backing filesystem is rewritten to set num_aces = 0xFFFF while\nkeeping the posix_acl_hash bytes intact so ksmbd_vfs_get_sd_xattr()\u0027s\nhash check still passes. A subsequent SMB2 CREATE of a child under\nthat parent drives smb2_open() into smb_inherit_dacl() (share has\n\"vfs objects = acl_xattr\" set), which fails the page allocator:\n\n WARNING: mm/page_alloc.c:5226 at __alloc_frozen_pages_noprof+0x46c/0x9c0\n Workqueue: ksmbd-io handle_ksmbd_work\n __alloc_frozen_pages_noprof+0x46c/0x9c0\n ___kmalloc_large_node+0x68/0x130\n __kmalloc_large_node_noprof+0x24/0x70\n __kmalloc_noprof+0x4c9/0x690\n smb_inherit_dacl+0x394/0x2430\n smb2_open+0x595d/0xabe0\n handle_ksmbd_work+0x3d3/0x1140\n\nWith the patch applied the added guard rejects the tampered value\nwith -EINVAL before any large allocation runs, smb2_open() falls back\nto smb2_create_sd_buffer(), and the child is created with a default\nSD. No warning, no splat.\n\nFix by:\n\n 1. Validating num_aces against pdacl_size using the same formula\n applied in parse_dacl().\n\n 2. Replacing the raw kmalloc(sizeof * num_aces * 2) with\n kmalloc_array(num_aces * 2, sizeof(...)) for overflow-safe\n allocation.\n\n 3. Tightening the per-ACE loop guard to require the minimum valid\n ACE size (offsetof(smb_ace, sid) + CIFS_SID_BASE_SIZE) and\n rejecting under-sized ACEs, matching the hardening in\n smb_check_perm_dacl() and parse_dacl().\n\nv1 -\u003e v2:\n - Replace the synthetic test-module splat in the changelog with a\n real-path UML + KASAN reproduction driven through mount.cifs and\n SMB2 CREATE; Namjae flagged the kcifs3_test_inherit_dacl_old name\n in v1 since it does not exist in ksmbd.\n - Drop the commit-hash citation from the code comment per Namjae\u0027s\n review; keep the parse_dacl() pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31706",
"url": "https://www.suse.com/security/cve/CVE-2026-31706"
},
{
"category": "external",
"summary": "SUSE Bug 1263885 for CVE-2026-31706",
"url": "https://bugzilla.suse.com/1263885"
},
{
"category": "external",
"summary": "SUSE Bug 1263925 for CVE-2026-31706",
"url": "https://bugzilla.suse.com/1263925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-31706"
},
{
"cve": "CVE-2026-31707",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31707"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: validate response sizes in ipc_validate_msg()\n\nipc_validate_msg() computes the expected message size for each\nresponse type by adding (or multiplying) attacker-controlled fields\nfrom the daemon response to a fixed struct size in unsigned int\narithmetic. Three cases can overflow:\n\n KSMBD_EVENT_RPC_REQUEST:\n msg_sz = sizeof(struct ksmbd_rpc_command) + resp-\u003epayload_sz;\n KSMBD_EVENT_SHARE_CONFIG_REQUEST:\n msg_sz = sizeof(struct ksmbd_share_config_response) +\n resp-\u003epayload_sz;\n KSMBD_EVENT_LOGIN_REQUEST_EXT:\n msg_sz = sizeof(struct ksmbd_login_response_ext) +\n resp-\u003engroups * sizeof(gid_t);\n\nresp-\u003epayload_sz is __u32 and resp-\u003engroups is __s32. Each addition\ncan wrap in unsigned int; the multiplication by sizeof(gid_t) mixes\nsigned and size_t, so a negative ngroups is converted to SIZE_MAX\nbefore the multiply. A wrapped value of msg_sz that happens to\nequal entry-\u003emsg_sz bypasses the size check on the next line, and\ndownstream consumers (smb2pdu.c:6742 memcpy using rpc_resp-\u003epayload_sz,\nkmemdup in ksmbd_alloc_user using resp_ext-\u003engroups) then trust the\nunverified length.\n\nUse check_add_overflow() on the RPC_REQUEST and SHARE_CONFIG_REQUEST\npaths to detect integer overflow without constraining functional\npayload size; userspace ksmbd-tools grows NDR responses in 4096-byte\nchunks for calls like NetShareEnumAll, so a hard transport cap is\nunworkable on the response side. For LOGIN_REQUEST_EXT, reject\nresp-\u003engroups outside the signed [0, NGROUPS_MAX] range up front and\nreport the error from ipc_validate_msg() so it fires at the IPC\nboundary; with that bound the subsequent multiplication and addition\nstay well below UINT_MAX. The now-redundant ngroups check and\npr_err in ksmbd_alloc_user() are removed.\n\nThis is the response-side analogue of aab98e2dbd64 (\"ksmbd: fix\ninteger overflows on 32 bit systems\"), which hardened the request\nside.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31707",
"url": "https://www.suse.com/security/cve/CVE-2026-31707"
},
{
"category": "external",
"summary": "SUSE Bug 1263875 for CVE-2026-31707",
"url": "https://bugzilla.suse.com/1263875"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-31707"
},
{
"cve": "CVE-2026-31708",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31708"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix OOB read in smb2_ioctl_query_info QUERY_INFO path\n\nsmb2_ioctl_query_info() has two response-copy branches: PASSTHRU_FSCTL\nand the default QUERY_INFO path. The QUERY_INFO branch clamps\nqi.input_buffer_length to the server-reported OutputBufferLength and then\ncopies qi.input_buffer_length bytes from qi_rsp-\u003eBuffer to userspace, but\nit never verifies that the flexible-array payload actually fits within\nrsp_iov[1].iov_len.\n\nA malicious server can return OutputBufferLength larger than the actual\nQUERY_INFO response, causing copy_to_user() to walk past the response\nbuffer and expose adjacent kernel heap to userspace.\n\nGuard the QUERY_INFO copy with a bounds check on the actual Buffer\npayload. Use struct_size(qi_rsp, Buffer, qi.input_buffer_length)\nrather than an open-coded addition so the guard cannot overflow on\n32-bit builds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31708",
"url": "https://www.suse.com/security/cve/CVE-2026-31708"
},
{
"category": "external",
"summary": "SUSE Bug 1264022 for CVE-2026-31708",
"url": "https://bugzilla.suse.com/1264022"
},
{
"category": "external",
"summary": "SUSE Bug 1264139 for CVE-2026-31708",
"url": "https://bugzilla.suse.com/1264139"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-31708"
},
{
"cve": "CVE-2026-31709",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31709"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: validate the whole DACL before rewriting it in cifsacl\n\nbuild_sec_desc() and id_mode_to_cifs_acl() derive a DACL pointer from a\nserver-supplied dacloffset and then use the incoming ACL to rebuild the\nchmod/chown security descriptor.\n\nThe original fix only checked that the struct smb_acl header fits before\nreading dacl_ptr-\u003esize or dacl_ptr-\u003enum_aces. That avoids the immediate\nheader-field OOB read, but the rewrite helpers still walk ACEs based on\npdacl-\u003enum_aces with no structural validation of the incoming DACL body.\n\nA malicious server can return a truncated DACL that still contains a\nheader, claims one or more ACEs, and then drive\nreplace_sids_and_copy_aces() or set_chmod_dacl() past the validated\nextent while they compare or copy attacker-controlled ACEs.\n\nFactor the DACL structural checks into validate_dacl(), extend them to\nvalidate each ACE against the DACL bounds, and use the shared validator\nbefore the chmod/chown rebuild paths. parse_dacl() reuses the same\nvalidator so the read-side parser and write-side rewrite paths agree on\nwhat constitutes a well-formed incoming DACL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31709",
"url": "https://www.suse.com/security/cve/CVE-2026-31709"
},
{
"category": "external",
"summary": "SUSE Bug 1264024 for CVE-2026-31709",
"url": "https://bugzilla.suse.com/1264024"
},
{
"category": "external",
"summary": "SUSE Bug 1264140 for CVE-2026-31709",
"url": "https://bugzilla.suse.com/1264140"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-31709"
},
{
"cve": "CVE-2026-31710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31710"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix dir separator in SMB1 UNIX mounts\n\nWhen calling cifs_mount_get_tcon() with SMB1 UNIX mounts,\n@cifs_sb-\u003emnt_cifs_flags needs to be read or updated only after\ncalling reset_cifs_unix_caps(), otherwise it might end up with missing\nCIFS_MOUNT_POSIXACL and CIFS_MOUNT_POSIX_PATHS bits.\n\nThis fixes the wrong dir separator used in paths caused by the missing\nCIFS_MOUNT_POSIX_PATHS bit in cifs_sb_info::mnt_cifs_flags.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31710",
"url": "https://www.suse.com/security/cve/CVE-2026-31710"
},
{
"category": "external",
"summary": "SUSE Bug 1264027 for CVE-2026-31710",
"url": "https://bugzilla.suse.com/1264027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-31710"
},
{
"cve": "CVE-2026-31711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31711"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: server: fix active_num_conn leak on transport allocation failure\n\nCommit 77ffbcac4e56 (\"smb: server: fix leak of active_num_conn in\nksmbd_tcp_new_connection()\") addressed the kthread_run() failure\npath. The earlier alloc_transport() == NULL path in the same\nfunction has the same leak, is reachable pre-authentication via any\nTCP connect to port 445, and was empirically reproduced on UML\n(ARCH=um, v7.0-rc7): a small number of forced allocation failures\nwere sufficient to put ksmbd into a state where every subsequent\nconnection attempt was rejected for the remainder of the boot.\n\nksmbd_kthread_fn() increments active_num_conn before calling\nksmbd_tcp_new_connection() and discards the return value, so when\nalloc_transport() returns NULL the socket is released and -ENOMEM\nreturned without decrementing the counter. Each such failure\npermanently consumes one slot from the max_connections pool; once\ncumulative failures reach the cap, atomic_inc_return() hits the\nthreshold on every subsequent accept and every new connection is\nrejected. The counter is only reset by module reload.\n\nAn unauthenticated remote attacker can drive the server toward the\nmemory pressure that makes alloc_transport() fail by holding open\nconnections with large RFC1002 lengths up to MAX_STREAM_PROT_LEN\n(0x00FFFFFF); natural transient allocation failures on a loaded\nhost produce the same drift more slowly.\n\nMirror the existing rollback pattern in ksmbd_kthread_fn(): on the\nalloc_transport() failure path, decrement active_num_conn gated on\nserver_conf.max_connections.\n\nRepro details: with the patch reverted, forced alloc_transport()\nNULL returns leaked counter slots and subsequent connection\nattempts -- including legitimate connects issued after the\nforced-fail window had closed -- were all rejected with \"Limit the\nmaximum number of connections\". With this patch applied, the same\nconnect sequence produces no rejections and the counter cycles\ncleanly between zero and one on every accept.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31711",
"url": "https://www.suse.com/security/cve/CVE-2026-31711"
},
{
"category": "external",
"summary": "SUSE Bug 1264029 for CVE-2026-31711",
"url": "https://bugzilla.suse.com/1264029"
},
{
"category": "external",
"summary": "SUSE Bug 1264141 for CVE-2026-31711",
"url": "https://bugzilla.suse.com/1264141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-31711"
},
{
"cve": "CVE-2026-31712",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31712"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: require minimum ACE size in smb_check_perm_dacl()\n\nBoth ACE-walk loops in smb_check_perm_dacl() only guard against an\nunder-sized remaining buffer, not against an ACE whose declared\n`ace-\u003esize` is smaller than the struct it claims to describe:\n\n if (offsetof(struct smb_ace, access_req) \u003e aces_size)\n break;\n ace_size = le16_to_cpu(ace-\u003esize);\n if (ace_size \u003e aces_size)\n break;\n\nThe first check only requires the 4-byte ACE header to be in bounds;\nit does not require access_req (4 bytes at offset 4) to be readable.\nAn attacker who has set a crafted DACL on a file they own can declare\nace-\u003esize == 4 with aces_size == 4, pass both checks, and then\n\n granted |= le32_to_cpu(ace-\u003eaccess_req); /* upper loop */\n compare_sids(\u0026sid, \u0026ace-\u003esid); /* lower loop */\n\nreads access_req at offset 4 (OOB by up to 4 bytes) and ace-\u003esid at\noffset 8 (OOB by up to CIFS_SID_BASE_SIZE + SID_MAX_SUB_AUTHORITIES\n* 4 bytes).\n\nTighten both loops to require\n\n ace_size \u003e= offsetof(struct smb_ace, sid) + CIFS_SID_BASE_SIZE\n\nwhich is the smallest valid on-wire ACE layout (4-byte header +\n4-byte access_req + 8-byte sid base with zero sub-auths). Also\nreject ACEs whose sid.num_subauth exceeds SID_MAX_SUB_AUTHORITIES\nbefore letting compare_sids() dereference sub_auth[] entries.\n\nparse_sec_desc() already enforces an equivalent check (lines 441-448);\nsmb_check_perm_dacl() simply grew weaker validation over time.\n\nReachability: authenticated SMB client with permission to set an ACL\non a file. On a subsequent CREATE against that file, the kernel\nwalks the stored DACL via smb_check_perm_dacl() and triggers the\nOOB read. Not pre-auth, and the OOB read is not reflected to the\nattacker, but KASAN reports and kernel state corruption are\npossible.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31712",
"url": "https://www.suse.com/security/cve/CVE-2026-31712"
},
{
"category": "external",
"summary": "SUSE Bug 1264113 for CVE-2026-31712",
"url": "https://bugzilla.suse.com/1264113"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-31712"
},
{
"cve": "CVE-2026-31713",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31713"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfuse: abort on fatal signal during sync init\n\nWhen sync init is used and the server exits for some reason (error, crash)\nwhile processing FUSE_INIT, the filesystem creation will hang. The reason\nis that while all other threads will exit, the mounting thread (or process)\nwill keep the device fd open, which will prevent an abort from happening.\n\nThis is a regression from the async mount case, where the mount was done\nfirst, and the FUSE_INIT processing afterwards, in which case there\u0027s no\nsuch recursive syscall keeping the fd open.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31713",
"url": "https://www.suse.com/security/cve/CVE-2026-31713"
},
{
"category": "external",
"summary": "SUSE Bug 1264108 for CVE-2026-31713",
"url": "https://bugzilla.suse.com/1264108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-31713"
},
{
"cve": "CVE-2026-31714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31714"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid memory leak in f2fs_rename()\n\nsyzbot reported a f2fs bug as below:\n\nBUG: memory leak\nunreferenced object 0xffff888127f70830 (size 16):\n comm \"syz.0.23\", pid 6144, jiffies 4294943712\n hex dump (first 16 bytes):\n 3c af 57 72 5b e6 8f ad 6e 8e fd 33 42 39 03 ff \u003c.Wr[...n..3B9..\n backtrace (crc 925f8a80):\n kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]\n slab_post_alloc_hook mm/slub.c:4520 [inline]\n slab_alloc_node mm/slub.c:4844 [inline]\n __do_kmalloc_node mm/slub.c:5237 [inline]\n __kmalloc_noprof+0x3bd/0x560 mm/slub.c:5250\n kmalloc_noprof include/linux/slab.h:954 [inline]\n fscrypt_setup_filename+0x15e/0x3b0 fs/crypto/fname.c:364\n f2fs_setup_filename+0x52/0xb0 fs/f2fs/dir.c:143\n f2fs_rename+0x159/0xca0 fs/f2fs/namei.c:961\n f2fs_rename2+0xd5/0xf20 fs/f2fs/namei.c:1308\n vfs_rename+0x7ff/0x1250 fs/namei.c:6026\n filename_renameat2+0x4f4/0x660 fs/namei.c:6144\n __do_sys_renameat2 fs/namei.c:6173 [inline]\n __se_sys_renameat2 fs/namei.c:6168 [inline]\n __x64_sys_renameat2+0x59/0x80 fs/namei.c:6168\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nThe root cause is in commit 40b2d55e0452 (\"f2fs: fix to create selinux\nlabel during whiteout initialization\"), we added a call to\nf2fs_setup_filename() without a matching call to f2fs_free_filename(),\nfix it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31714",
"url": "https://www.suse.com/security/cve/CVE-2026-31714"
},
{
"category": "external",
"summary": "SUSE Bug 1263899 for CVE-2026-31714",
"url": "https://bugzilla.suse.com/1263899"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2026-31714"
},
{
"cve": "CVE-2026-31715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31715"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix UAF caused by decrementing sbi-\u003enr_pages[] in f2fs_write_end_io()\n\nThe xfstests case \"generic/107\" and syzbot have both reported a NULL\npointer dereference.\n\nThe concurrent scenario that triggers the panic is as follows:\n\nF2FS_WB_CP_DATA write callback umount\n - f2fs_write_checkpoint\n - f2fs_wait_on_all_pages(sbi, F2FS_WB_CP_DATA)\n- blk_mq_end_request\n - bio_endio\n - f2fs_write_end_io\n : dec_page_count(sbi, F2FS_WB_CP_DATA)\n : wake_up(\u0026sbi-\u003ecp_wait)\n - kill_f2fs_super\n - kill_block_super\n - f2fs_put_super\n : iput(sbi-\u003enode_inode)\n : sbi-\u003enode_inode = NULL\n : f2fs_in_warm_node_list\n - is_node_folio // sbi-\u003enode_inode is NULL and panic\n\nThe root cause is that f2fs_put_super() calls iput(sbi-\u003enode_inode) and\nsets sbi-\u003enode_inode to NULL after sbi-\u003enr_pages[F2FS_WB_CP_DATA] is\ndecremented to zero. As a result, f2fs_in_warm_node_list() may\ndereference a NULL node_inode when checking whether a folio belongs to\nthe node inode, leading to a panic.\n\nThis patch fixes the issue by calling f2fs_in_warm_node_list() before\ndecrementing sbi-\u003enr_pages[F2FS_WB_CP_DATA], thus preventing the\nuse-after-free condition.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31715",
"url": "https://www.suse.com/security/cve/CVE-2026-31715"
},
{
"category": "external",
"summary": "SUSE Bug 1264120 for CVE-2026-31715",
"url": "https://bugzilla.suse.com/1264120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-31715"
},
{
"cve": "CVE-2026-31716",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31716"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: validate rec-\u003eused in journal-replay file record check\n\ncheck_file_record() validates rec-\u003etotal against the record size but\nnever validates rec-\u003eused. The do_action() journal-replay handlers read\nrec-\u003eused from disk and use it to compute memmove lengths:\n\n DeleteAttribute: memmove(attr, ..., used - asize - roff)\n CreateAttribute: memmove(..., attr, used - roff)\n change_attr_size: memmove(..., used - PtrOffset(rec, next))\n\nWhen rec-\u003eused is smaller than the offset of a validated attribute, or\nlarger than the record size, these subtractions can underflow allowing\nus to copy huge amounts of memory in to a 4kb buffer, generally\nconsidered a bad idea overall.\n\nThis requires a corrupted filesystem, which isn\u0027t a threat model the\nkernel really needs to worry about, but checking for such an obvious\nout-of-bounds value is good to keep things robust, especially on journal\nreplay\n\nFix this up by bounding rec-\u003eused correctly.\n\nThis is much like commit b2bc7c44ed17 (\"fs/ntfs3: Fix slab-out-of-bounds\nread in DeleteIndexEntryRoot\") which checked different values in this\nsame switch statement.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31716",
"url": "https://www.suse.com/security/cve/CVE-2026-31716"
},
{
"category": "external",
"summary": "SUSE Bug 1264107 for CVE-2026-31716",
"url": "https://bugzilla.suse.com/1264107"
},
{
"category": "external",
"summary": "SUSE Bug 1264136 for CVE-2026-31716",
"url": "https://bugzilla.suse.com/1264136"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-31716"
},
{
"cve": "CVE-2026-31717",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31717"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: validate owner of durable handle on reconnect\n\nCurrently, ksmbd does not verify if the user attempting to reconnect\nto a durable handle is the same user who originally opened the file.\nThis allows any authenticated user to hijack an orphaned durable handle\nby predicting or brute-forcing the persistent ID.\n\nAccording to MS-SMB2, the server MUST verify that the SecurityContext\nof the reconnect request matches the SecurityContext associated with\nthe existing open.\nAdd a durable_owner structure to ksmbd_file to store the original opener\u0027s\nUID, GID, and account name. and catpure the owner information when a file\nhandle becomes orphaned. and implementing ksmbd_vfs_compare_durable_owner()\nto validate the identity of the requester during SMB2_CREATE (DHnC).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31717",
"url": "https://www.suse.com/security/cve/CVE-2026-31717"
},
{
"category": "external",
"summary": "SUSE Bug 1264118 for CVE-2026-31717",
"url": "https://bugzilla.suse.com/1264118"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-31717"
},
{
"cve": "CVE-2026-31718",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31718"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix use-after-free in __ksmbd_close_fd() via durable scavenger\n\nWhen a durable file handle survives session disconnect (TCP close without\nSMB2_LOGOFF), session_fd_check() sets fp-\u003econn = NULL to preserve the\nhandle for later reconnection. However, it did not clean up the byte-range\nlocks on fp-\u003elock_list.\n\nLater, when the durable scavenger thread times out and calls\n__ksmbd_close_fd(NULL, fp), the lock cleanup loop did:\n\n spin_lock(\u0026fp-\u003econn-\u003ellist_lock);\n\nThis caused a slab use-after-free because fp-\u003econn was NULL and the\noriginal connection object had already been freed by\nksmbd_tcp_disconnect().\n\nThe root cause is asymmetric cleanup: lock entries (smb_lock-\u003eclist) were\nleft dangling on the freed conn-\u003elock_list while fp-\u003econn was nulled out.\n\nTo fix this issue properly, we need to handle the lifetime of\nsmb_lock-\u003eclist across three paths:\n - Safely skip clist deletion when list is empty and fp-\u003econn is NULL.\n - Remove the lock from the old connection\u0027s lock_list in\n session_fd_check()\n - Re-add the lock to the new connection\u0027s lock_list in\n ksmbd_reopen_durable_fd().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31718",
"url": "https://www.suse.com/security/cve/CVE-2026-31718"
},
{
"category": "external",
"summary": "SUSE Bug 1264114 for CVE-2026-31718",
"url": "https://bugzilla.suse.com/1264114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-31718"
},
{
"cve": "CVE-2026-31719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-31719"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: krb5enc - fix async decrypt skipping hash verification\n\nkrb5enc_dispatch_decrypt() sets req-\u003ebase.complete as the skcipher\ncallback, which is the caller\u0027s own completion handler. When the\nskcipher completes asynchronously, this signals \"done\" to the caller\nwithout executing krb5enc_dispatch_decrypt_hash(), completely bypassing\nthe integrity verification (hash check).\n\nCompare with the encrypt path which correctly uses\nkrb5enc_encrypt_done as an intermediate callback to chain into the\nhash computation on async completion.\n\nFix by adding krb5enc_decrypt_done as an intermediate callback that\nchains into krb5enc_dispatch_decrypt_hash() upon async skcipher\ncompletion, matching the encrypt path\u0027s callback pattern.\n\nAlso fix EBUSY/EINPROGRESS handling throughout: remove\nkrb5enc_request_complete() which incorrectly swallowed EINPROGRESS\nnotifications that must be passed up to callers waiting on backlogged\nrequests, and add missing EBUSY checks in krb5enc_encrypt_ahash_done\nfor the dispatch_encrypt return value.\n\n\nUnset MAY_BACKLOG on the async completion path so the user won\u0027t\nsee back-to-back EINPROGRESS notifications.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-31719",
"url": "https://www.suse.com/security/cve/CVE-2026-31719"
},
{
"category": "external",
"summary": "SUSE Bug 1264115 for CVE-2026-31719",
"url": "https://bugzilla.suse.com/1264115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-31719"
},
{
"cve": "CVE-2026-43058",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43058"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: vidtv: fix pass-by-value structs causing MSAN warnings\n\nvidtv_ts_null_write_into() and vidtv_ts_pcr_write_into() take their\nargument structs by value, causing MSAN to report uninit-value warnings.\nWhile only vidtv_ts_null_write_into() has triggered a report so far,\nboth functions share the same issue.\n\nFix by passing both structs by const pointer instead, avoiding the\nstack copy of the struct along with its MSAN shadow and origin metadata.\nThe functions do not modify the structs, which is enforced by the const\nqualifier.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43058",
"url": "https://www.suse.com/security/cve/CVE-2026-43058"
},
{
"category": "external",
"summary": "SUSE Bug 1264129 for CVE-2026-43058",
"url": "https://bugzilla.suse.com/1264129"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-43058"
},
{
"cve": "CVE-2026-43071",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43071"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndcache: Limit the minimal number of bucket to two\n\nThere is an OOB read problem on dentry_hashtable when user sets\n\u0027dhash_entries=1\u0027:\n BUG: unable to handle page fault for address: ffff888b30b774b0\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n Oops: Oops: 0000 [#1] SMP PTI\n RIP: 0010:__d_lookup+0x56/0x120\n Call Trace:\n d_lookup.cold+0x16/0x5d\n lookup_dcache+0x27/0xf0\n lookup_one_qstr_excl+0x2a/0x180\n start_dirop+0x55/0xa0\n simple_start_creating+0x8d/0xa0\n debugfs_start_creating+0x8c/0x180\n debugfs_create_dir+0x1d/0x1c0\n pinctrl_init+0x6d/0x140\n do_one_initcall+0x6d/0x3d0\n kernel_init_freeable+0x39f/0x460\n kernel_init+0x2a/0x260\n\nThere will be only one bucket in dentry_hashtable when dhash_entries is\nset as one, and d_hash_shift is calculated as 32 by dcache_init(). Then,\nfollowing process will access more than one buckets(which memory region\nis not allocated) in dentry_hashtable:\n d_lookup\n b = d_hash(hash)\n dentry_hashtable + ((u32)hashlen \u003e\u003e d_hash_shift)\n // The C standard defines the behavior of right shift amounts\n // exceeding the bit width of the operand as undefined. The\n // result of \u0027(u32)hashlen \u003e\u003e d_hash_shift\u0027 becomes \u0027hashlen\u0027,\n // so \u0027b\u0027 will point to an unallocated memory region.\n hlist_bl_for_each_entry_rcu(b)\n hlist_bl_first_rcu(head)\n h-\u003efirst // read OOB!\n\nFix it by limiting the minimal number of dentry_hashtable bucket to two,\nso that \u0027d_hash_shift\u0027 won\u0027t exceeds the bit width of type u32.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43071",
"url": "https://www.suse.com/security/cve/CVE-2026-43071"
},
{
"category": "external",
"summary": "SUSE Bug 1264289 for CVE-2026-43071",
"url": "https://bugzilla.suse.com/1264289"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-43071"
},
{
"cve": "CVE-2026-43072",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43072"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vc4: platform_get_irq_byname() returns an int\n\nplatform_get_irq_byname() will return a negative value if an error\nhappens, so it should be checked and not just passed directly into\ndevm_request_threaded_irq() hoping all will be ok.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43072",
"url": "https://www.suse.com/security/cve/CVE-2026-43072"
},
{
"category": "external",
"summary": "SUSE Bug 1264451 for CVE-2026-43072",
"url": "https://bugzilla.suse.com/1264451"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-43072"
},
{
"cve": "CVE-2026-43073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43073"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86-64: rename misleadingly named \u0027__copy_user_nocache()\u0027 function\n\nThis function was a masterclass in bad naming, for various historical\nreasons.\n\nIt claimed to be a non-cached user copy. It is literally _neither_ of\nthose things. It\u0027s a specialty memory copy routine that uses\nnon-temporal stores for the destination (but not the source), and that\ndoes exception handling for both source and destination accesses.\n\nAlso note that while it works for unaligned targets, any unaligned parts\n(whether at beginning or end) will not use non-temporal stores, since\nonly words and quadwords can be non-temporal on x86.\n\nThe exception handling means that it _can_ be used for user space\naccesses, but not on its own - it needs all the normal \"start user space\naccess\" logic around it.\n\nBut typically the user space access would be the source, not the\nnon-temporal destination. That was the original intention of this,\nwhere the destination was some fragile persistent memory target that\nneeded non-temporal stores in order to catch machine check exceptions\nsynchronously and deal with them gracefully.\n\nThus that non-descriptive name: one use case was to copy from user space\ninto a non-cached kernel buffer. However, the existing users are a mix\nof that intended use-case, and a couple of random drivers that just did\nthis as a performance tweak.\n\nSome of those random drivers then actively misused the user copying\nversion (with STAC/CLAC and all) to do kernel copies without ever even\ncaring about the exception handling, _just_ for the non-temporal\ndestination.\n\nRename it as a first small step to actually make it halfway sane, and\nchange the prototype to be more normal: it doesn\u0027t take a user pointer\nunless the caller has done the proper conversion, and the argument size\nis the full size_t (it still won\u0027t actually copy more than 4GB in one\ngo, but there\u0027s also no reason to silently truncate the size argument in\nthe caller).\n\nFinally, use this now sanely named function in the NTB code, which\nmis-used a user copy version (with STAC/CLAC and all) of this interface\ndespite it not actually being a user copy at all.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43073",
"url": "https://www.suse.com/security/cve/CVE-2026-43073"
},
{
"category": "external",
"summary": "SUSE Bug 1264454 for CVE-2026-43073",
"url": "https://bugzilla.suse.com/1264454"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-43073"
},
{
"cve": "CVE-2026-43284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43284"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: esp: avoid in-place decrypt on shared skb frags\n\nMSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP\nmarks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(),\nso later paths that may modify packet data can first make a private\ncopy. The IPv4/IPv6 datagram append paths did not set this flag when\nsplicing pages into UDP skbs.\n\nThat leaves an ESP-in-UDP packet made from shared pipe pages looking\nlike an ordinary uncloned nonlinear skb. ESP input then takes the no-COW\nfast path for uncloned skbs without a frag_list and decrypts in place\nover data that is not owned privately by the skb.\n\nMark IPv4/IPv6 datagram splice frags with SKBFL_SHARED_FRAG, matching\nTCP. Also make ESP input fall back to skb_cow_data() when the flag is\npresent, so ESP does not decrypt externally backed frags in place.\nPrivate nonlinear skb frags still use the existing fast path.\n\nThis intentionally does not change ESP output. In esp_output_head(),\nthe path that appends the ESP trailer to existing skb tailroom without\ncalling skb_cow_data() is not reachable for nonlinear skbs:\nskb_tailroom() returns zero when skb-\u003edata_len is nonzero, while ESP\ntailen is positive. Thus ESP output will either use the separate\ndestination-frag path or fall back to skb_cow_data().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43284",
"url": "https://www.suse.com/security/cve/CVE-2026-43284"
},
{
"category": "external",
"summary": "SUSE Bug 1264449 for CVE-2026-43284",
"url": "https://bugzilla.suse.com/1264449"
},
{
"category": "external",
"summary": "SUSE Bug 1264459 for CVE-2026-43284",
"url": "https://bugzilla.suse.com/1264459"
},
{
"category": "external",
"summary": "SUSE Bug 1265383 for CVE-2026-43284",
"url": "https://bugzilla.suse.com/1265383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-43284"
},
{
"cve": "CVE-2026-43348",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43348"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmshv_vtl: Fix vmemmap_shift exceeding MAX_FOLIO_ORDER\n\nWhen registering VTL0 memory via MSHV_ADD_VTL0_MEMORY, the kernel\ncomputes pgmap-\u003evmemmap_shift as the number of trailing zeros in the\nOR of start_pfn and last_pfn, intending to use the largest compound\npage order both endpoints are aligned to.\n\nHowever, this value is not clamped to MAX_FOLIO_ORDER, so a\nsufficiently aligned range (e.g. physical range\n[0x800000000000, 0x800080000000), corresponding to start_pfn=0x800000000\nwith 35 trailing zeros) can produce a shift larger than what\nmemremap_pages() accepts, triggering a WARN and returning -EINVAL:\n\n WARNING: ... memremap_pages+0x512/0x650\n requested folio size unsupported\n\nThe MAX_FOLIO_ORDER check was added by\ncommit 646b67d57589 (\"mm/memremap: reject unreasonable folio/compound\npage sizes in memremap_pages()\").\n\nFix this by clamping vmemmap_shift to MAX_FOLIO_ORDER so we always\nrequest the largest order the kernel supports, in those cases, rather\nthan an out-of-range value.\n\nAlso fix the error path to propagate the actual error code from\ndevm_memremap_pages() instead of hard-coding -EFAULT, which was\nmasking the real -EINVAL return.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43348",
"url": "https://www.suse.com/security/cve/CVE-2026-43348"
},
{
"category": "external",
"summary": "SUSE Bug 1264981 for CVE-2026-43348",
"url": "https://bugzilla.suse.com/1264981"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-43348"
},
{
"cve": "CVE-2026-43349",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43349"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid uninit-value access in f2fs_sanity_check_node_footer\n\nsyzbot reported a f2fs bug as below:\n\nBUG: KMSAN: uninit-value in f2fs_sanity_check_node_footer+0x374/0xa20 fs/f2fs/node.c:1520\n f2fs_sanity_check_node_footer+0x374/0xa20 fs/f2fs/node.c:1520\n f2fs_finish_read_bio+0xe1e/0x1d60 fs/f2fs/data.c:177\n f2fs_read_end_io+0x6ab/0x2220 fs/f2fs/data.c:-1\n bio_endio+0x1006/0x1160 block/bio.c:1792\n submit_bio_noacct+0x533/0x2960 block/blk-core.c:891\n submit_bio+0x57a/0x620 block/blk-core.c:926\n blk_crypto_submit_bio include/linux/blk-crypto.h:203 [inline]\n f2fs_submit_read_bio+0x12c/0x360 fs/f2fs/data.c:557\n f2fs_submit_page_bio+0xee2/0x1450 fs/f2fs/data.c:775\n read_node_folio+0x384/0x4b0 fs/f2fs/node.c:1481\n __get_node_folio+0x5db/0x15d0 fs/f2fs/node.c:1576\n f2fs_get_inode_folio+0x40/0x50 fs/f2fs/node.c:1623\n do_read_inode fs/f2fs/inode.c:425 [inline]\n f2fs_iget+0x1209/0x9380 fs/f2fs/inode.c:596\n f2fs_fill_super+0x8f5a/0xb2e0 fs/f2fs/super.c:5184\n get_tree_bdev_flags+0x6e6/0x920 fs/super.c:1694\n get_tree_bdev+0x38/0x50 fs/super.c:1717\n f2fs_get_tree+0x35/0x40 fs/f2fs/super.c:5436\n vfs_get_tree+0xb3/0x5d0 fs/super.c:1754\n fc_mount fs/namespace.c:1193 [inline]\n do_new_mount_fc fs/namespace.c:3763 [inline]\n do_new_mount+0x885/0x1dd0 fs/namespace.c:3839\n path_mount+0x7a2/0x20b0 fs/namespace.c:4159\n do_mount fs/namespace.c:4172 [inline]\n __do_sys_mount fs/namespace.c:4361 [inline]\n __se_sys_mount+0x704/0x7f0 fs/namespace.c:4338\n __x64_sys_mount+0xe4/0x150 fs/namespace.c:4338\n x64_sys_call+0x39f0/0x3ea0 arch/x86/include/generated/asm/syscalls_64.h:166\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0x134/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nThe root cause is: in f2fs_finish_read_bio(), we may access uninit data\nin folio if we failed to read the data from device into folio, let\u0027s add\na check condition to avoid such issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43349",
"url": "https://www.suse.com/security/cve/CVE-2026-43349"
},
{
"category": "external",
"summary": "SUSE Bug 1265131 for CVE-2026-43349",
"url": "https://bugzilla.suse.com/1265131"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-43349"
},
{
"cve": "CVE-2026-43350",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43350"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: require a full NFS mode SID before reading mode bits\n\nparse_dacl() treats an ACE SID matching sid_unix_NFS_mode as an NFS\nmode SID and reads sid.sub_auth[2] to recover the mode bits.\n\nThat assumes the ACE carries three subauthorities, but compare_sids()\nonly compares min(a, b) subauthorities. A malicious server can return\nan ACE with num_subauth = 2 and sub_auth[] = {88, 3}, which still\nmatches sid_unix_NFS_mode and then drives the sub_auth[2] read four\nbytes past the end of the ACE.\n\nRequire num_subauth \u003e= 3 before treating the ACE as an NFS mode SID.\nThis keeps the fix local to the special-SID mode path without changing\ncompare_sids() semantics for the rest of cifsacl.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43350",
"url": "https://www.suse.com/security/cve/CVE-2026-43350"
},
{
"category": "external",
"summary": "SUSE Bug 1264985 for CVE-2026-43350",
"url": "https://bugzilla.suse.com/1264985"
},
{
"category": "external",
"summary": "SUSE Bug 1264986 for CVE-2026-43350",
"url": "https://bugzilla.suse.com/1264986"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-43350"
},
{
"cve": "CVE-2026-43490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43490"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: validate inherited ACE SID length\n\nsmb_inherit_dacl() walks the parent directory DACL loaded from the\nsecurity descriptor xattr. It verifies that each ACE contains the fixed\nSID header before using it, but does not verify that the variable-length\nSID described by sid.num_subauth is fully contained in the ACE.\n\nA malformed inheritable ACE can advertise more subauthorities than are\npresent in the ACE. compare_sids() may then read past the ACE.\nsmb_set_ace() also clamps the copied destination SID, but used the\nunchecked source SID count to compute the inherited ACE size. That could\nadvance the temporary inherited ACE buffer pointer and nt_size accounting\npast the allocated buffer.\n\nFix this by validating the parent ACE SID count and SID length before\nusing the SID during inheritance. Compute the inherited ACE size from the\ncopied SID so the size matches the bounded destination SID. Reject the\ninherited DACL if size accumulation would overflow smb_acl.size or the\nsecurity descriptor allocation size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43490",
"url": "https://www.suse.com/security/cve/CVE-2026-43490"
},
{
"category": "external",
"summary": "SUSE Bug 1265333 for CVE-2026-43490",
"url": "https://bugzilla.suse.com/1265333"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2026-43490"
},
{
"cve": "CVE-2026-43500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43500"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrxrpc: Also unshare DATA/RESPONSE packets when paged frags are present\n\nThe DATA-packet handler in rxrpc_input_call_event() and the RESPONSE\nhandler in rxrpc_verify_response() copy the skb to a linear one before\ncalling into the security ops only when skb_cloned() is true. An skb\nthat is not cloned but still carries externally-owned paged fragments\n(e.g. SKBFL_SHARED_FRAG set by splice() into a UDP socket via\n__ip_append_data, or a chained skb_has_frag_list()) falls through to\nthe in-place decryption path, which binds the frag pages directly into\nthe AEAD/skcipher SGL via skb_to_sgvec().\n\nExtend the gate to also unshare when skb_has_frag_list() or\nskb_has_shared_frag() is true. This catches the splice-loopback vector\nand other externally-shared frag sources while preserving the\nzero-copy fast path for skbs whose frags are kernel-private (e.g. NIC\npage_pool RX, GRO). The OOM/trace handling already in place is reused.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43500",
"url": "https://www.suse.com/security/cve/CVE-2026-43500"
},
{
"category": "external",
"summary": "SUSE Bug 1264450 for CVE-2026-43500",
"url": "https://bugzilla.suse.com/1264450"
},
{
"category": "external",
"summary": "SUSE Bug 1264458 for CVE-2026-43500",
"url": "https://bugzilla.suse.com/1264458"
},
{
"category": "external",
"summary": "SUSE Bug 1265383 for CVE-2026-43500",
"url": "https://bugzilla.suse.com/1265383"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-devel-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-macros-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-7.0.7-1.1.x86_64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.aarch64",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.s390x",
"openSUSE Tumbleweed:kernel-source-vanilla-7.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-43500"
}
]
}
WID-SEC-W-2026-1346
Vulnerability from csaf_certbund - Published: 2026-05-03 22:00 - Updated: 2026-05-20 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel
Open Source
|
cpe:/o:linux:linux_kernel:unspecified
|
— | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Microsoft Azure Linux azl3
Microsoft / Azure Linux
|
cpe:/o:microsoft:azure_linux:azl3
|
azl3 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— |
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um Sicherheitsmechanismen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder Auswirkungen unbestimmter Art zu erzielen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-1346 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1346.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-1346 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1346"
},
{
"category": "external",
"summary": "Kernel CVE Announce Mailingliste",
"url": "https://lore.kernel.org/linux-cve-announce/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31693",
"url": "https://lore.kernel.org/linux-cve-announce/2026043004-CVE-2026-31693-f964@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31694",
"url": "https://lore.kernel.org/linux-cve-announce/2026050139-CVE-2026-31694-f974@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31695",
"url": "https://lore.kernel.org/linux-cve-announce/2026050141-CVE-2026-31695-813b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31696",
"url": "https://lore.kernel.org/linux-cve-announce/2026050118-CVE-2026-31696-d2de@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31697",
"url": "https://lore.kernel.org/linux-cve-announce/2026050118-CVE-2026-31697-febc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31698",
"url": "https://lore.kernel.org/linux-cve-announce/2026050118-CVE-2026-31698-c4df@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31699",
"url": "https://lore.kernel.org/linux-cve-announce/2026050119-CVE-2026-31699-5ba8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31700",
"url": "https://lore.kernel.org/linux-cve-announce/2026050119-CVE-2026-31700-c820@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31701",
"url": "https://lore.kernel.org/linux-cve-announce/2026050119-CVE-2026-31701-fb7c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31702",
"url": "https://lore.kernel.org/linux-cve-announce/2026050120-CVE-2026-31702-4062@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31703",
"url": "https://lore.kernel.org/linux-cve-announce/2026050120-CVE-2026-31703-4c22@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31704",
"url": "https://lore.kernel.org/linux-cve-announce/2026050120-CVE-2026-31704-1144@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31705",
"url": "https://lore.kernel.org/linux-cve-announce/2026050121-CVE-2026-31705-5bdc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31706",
"url": "https://lore.kernel.org/linux-cve-announce/2026050121-CVE-2026-31706-e8b1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31707",
"url": "https://lore.kernel.org/linux-cve-announce/2026050121-CVE-2026-31707-84d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31708",
"url": "https://lore.kernel.org/linux-cve-announce/2026050121-CVE-2026-31708-f27c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31709",
"url": "https://lore.kernel.org/linux-cve-announce/2026050122-CVE-2026-31709-335b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31710",
"url": "https://lore.kernel.org/linux-cve-announce/2026050122-CVE-2026-31710-511c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31711",
"url": "https://lore.kernel.org/linux-cve-announce/2026050122-CVE-2026-31711-ad49@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31712",
"url": "https://lore.kernel.org/linux-cve-announce/2026050123-CVE-2026-31712-b794@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31713",
"url": "https://lore.kernel.org/linux-cve-announce/2026050123-CVE-2026-31713-2109@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31714",
"url": "https://lore.kernel.org/linux-cve-announce/2026050123-CVE-2026-31714-88ae@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31715",
"url": "https://lore.kernel.org/linux-cve-announce/2026050123-CVE-2026-31715-891c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31716",
"url": "https://lore.kernel.org/linux-cve-announce/2026050124-CVE-2026-31716-7d8b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31717",
"url": "https://lore.kernel.org/linux-cve-announce/2026050124-CVE-2026-31717-f68b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31718",
"url": "https://lore.kernel.org/linux-cve-announce/2026050124-CVE-2026-31718-5752@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31719",
"url": "https://lore.kernel.org/linux-cve-announce/2026050125-CVE-2026-31719-3da7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31720",
"url": "https://lore.kernel.org/linux-cve-announce/2026050131-CVE-2026-31720-3b60@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31721",
"url": "https://lore.kernel.org/linux-cve-announce/2026050133-CVE-2026-31721-3c17@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31722",
"url": "https://lore.kernel.org/linux-cve-announce/2026050134-CVE-2026-31722-2c70@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31723",
"url": "https://lore.kernel.org/linux-cve-announce/2026050134-CVE-2026-31723-a0a7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31724",
"url": "https://lore.kernel.org/linux-cve-announce/2026050134-CVE-2026-31724-d3e4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31725",
"url": "https://lore.kernel.org/linux-cve-announce/2026050135-CVE-2026-31725-6c90@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31726",
"url": "https://lore.kernel.org/linux-cve-announce/2026050135-CVE-2026-31726-0cb8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31727",
"url": "https://lore.kernel.org/linux-cve-announce/2026050135-CVE-2026-31727-0070@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31728",
"url": "https://lore.kernel.org/linux-cve-announce/2026050136-CVE-2026-31728-47b6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31729",
"url": "https://lore.kernel.org/linux-cve-announce/2026050136-CVE-2026-31729-6350@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31730",
"url": "https://lore.kernel.org/linux-cve-announce/2026050136-CVE-2026-31730-ff8a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31731",
"url": "https://lore.kernel.org/linux-cve-announce/2026050136-CVE-2026-31731-b01e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31732",
"url": "https://lore.kernel.org/linux-cve-announce/2026050137-CVE-2026-31732-c3a5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31733",
"url": "https://lore.kernel.org/linux-cve-announce/2026050137-CVE-2026-31733-aaa2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31734",
"url": "https://lore.kernel.org/linux-cve-announce/2026050137-CVE-2026-31734-da05@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31735",
"url": "https://lore.kernel.org/linux-cve-announce/2026050138-CVE-2026-31735-436c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31736",
"url": "https://lore.kernel.org/linux-cve-announce/2026050138-CVE-2026-31736-c2a4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31737",
"url": "https://lore.kernel.org/linux-cve-announce/2026050138-CVE-2026-31737-1078@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31738",
"url": "https://lore.kernel.org/linux-cve-announce/2026050138-CVE-2026-31738-7d4e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31739",
"url": "https://lore.kernel.org/linux-cve-announce/2026050139-CVE-2026-31739-4bc1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31740",
"url": "https://lore.kernel.org/linux-cve-announce/2026050139-CVE-2026-31740-70c8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31741",
"url": "https://lore.kernel.org/linux-cve-announce/2026050139-CVE-2026-31741-08c6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31742",
"url": "https://lore.kernel.org/linux-cve-announce/2026050140-CVE-2026-31742-e1b4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31743",
"url": "https://lore.kernel.org/linux-cve-announce/2026050140-CVE-2026-31743-e8c6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31744",
"url": "https://lore.kernel.org/linux-cve-announce/2026050140-CVE-2026-31744-50c5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31745",
"url": "https://lore.kernel.org/linux-cve-announce/2026050141-CVE-2026-31745-566d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31746",
"url": "https://lore.kernel.org/linux-cve-announce/2026050141-CVE-2026-31746-82d7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31747",
"url": "https://lore.kernel.org/linux-cve-announce/2026050141-CVE-2026-31747-430e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31748",
"url": "https://lore.kernel.org/linux-cve-announce/2026050141-CVE-2026-31748-ab3e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31749",
"url": "https://lore.kernel.org/linux-cve-announce/2026050142-CVE-2026-31749-e7d2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31750",
"url": "https://lore.kernel.org/linux-cve-announce/2026050142-CVE-2026-31750-2118@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31751",
"url": "https://lore.kernel.org/linux-cve-announce/2026050142-CVE-2026-31751-f6c7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31752",
"url": "https://lore.kernel.org/linux-cve-announce/2026050143-CVE-2026-31752-5596@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31753",
"url": "https://lore.kernel.org/linux-cve-announce/2026050143-CVE-2026-31753-cec6@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31754",
"url": "https://lore.kernel.org/linux-cve-announce/2026050143-CVE-2026-31754-ab16@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31755",
"url": "https://lore.kernel.org/linux-cve-announce/2026050143-CVE-2026-31755-c004@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31756",
"url": "https://lore.kernel.org/linux-cve-announce/2026050144-CVE-2026-31756-87ec@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31757",
"url": "https://lore.kernel.org/linux-cve-announce/2026050144-CVE-2026-31757-89cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31758",
"url": "https://lore.kernel.org/linux-cve-announce/2026050144-CVE-2026-31758-8487@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31759",
"url": "https://lore.kernel.org/linux-cve-announce/2026050145-CVE-2026-31759-426b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31760",
"url": "https://lore.kernel.org/linux-cve-announce/2026050145-CVE-2026-31760-05cb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31761",
"url": "https://lore.kernel.org/linux-cve-announce/2026050145-CVE-2026-31761-6af9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31762",
"url": "https://lore.kernel.org/linux-cve-announce/2026050146-CVE-2026-31762-c535@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31763",
"url": "https://lore.kernel.org/linux-cve-announce/2026050146-CVE-2026-31763-cd98@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31764",
"url": "https://lore.kernel.org/linux-cve-announce/2026050146-CVE-2026-31764-8607@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31766",
"url": "https://lore.kernel.org/linux-cve-announce/2026050147-CVE-2026-31766-dd6d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31767",
"url": "https://lore.kernel.org/linux-cve-announce/2026050147-CVE-2026-31767-cfcf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31768",
"url": "https://lore.kernel.org/linux-cve-announce/2026050147-CVE-2026-31768-6fbc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31769",
"url": "https://lore.kernel.org/linux-cve-announce/2026050148-CVE-2026-31769-8cd1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31770",
"url": "https://lore.kernel.org/linux-cve-announce/2026050148-CVE-2026-31770-f142@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31771",
"url": "https://lore.kernel.org/linux-cve-announce/2026050148-CVE-2026-31771-9cd0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31772",
"url": "https://lore.kernel.org/linux-cve-announce/2026050149-CVE-2026-31772-2024@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31773",
"url": "https://lore.kernel.org/linux-cve-announce/2026050149-CVE-2026-31773-e287@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31774",
"url": "https://lore.kernel.org/linux-cve-announce/2026050149-CVE-2026-31774-5303@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31775",
"url": "https://lore.kernel.org/linux-cve-announce/2026050149-CVE-2026-31775-366f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31776",
"url": "https://lore.kernel.org/linux-cve-announce/2026050150-CVE-2026-31776-8e0f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31777",
"url": "https://lore.kernel.org/linux-cve-announce/2026050150-CVE-2026-31777-20f9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31778",
"url": "https://lore.kernel.org/linux-cve-announce/2026050150-CVE-2026-31778-5ddb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31779",
"url": "https://lore.kernel.org/linux-cve-announce/2026050151-CVE-2026-31779-a44d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31780",
"url": "https://lore.kernel.org/linux-cve-announce/2026050151-CVE-2026-31780-b92a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31781",
"url": "https://lore.kernel.org/linux-cve-announce/2026050151-CVE-2026-31781-8a5d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31782",
"url": "https://lore.kernel.org/linux-cve-announce/2026050151-CVE-2026-31782-0f2d@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31783",
"url": "https://lore.kernel.org/linux-cve-announce/2026050152-CVE-2026-31783-782b@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31784",
"url": "https://lore.kernel.org/linux-cve-announce/2026050152-CVE-2026-31784-66d5@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-31785",
"url": "https://lore.kernel.org/linux-cve-announce/2026050152-CVE-2026-31785-e014@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43004",
"url": "https://lore.kernel.org/linux-cve-announce/2026050153-CVE-2026-43004-13b2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43005",
"url": "https://lore.kernel.org/linux-cve-announce/2026050153-CVE-2026-43005-d389@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43006",
"url": "https://lore.kernel.org/linux-cve-announce/2026050153-CVE-2026-43006-e4be@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43007",
"url": "https://lore.kernel.org/linux-cve-announce/2026050154-CVE-2026-43007-469f@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43008",
"url": "https://lore.kernel.org/linux-cve-announce/2026050154-CVE-2026-43008-bd5e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43009",
"url": "https://lore.kernel.org/linux-cve-announce/2026050154-CVE-2026-43009-5444@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43010",
"url": "https://lore.kernel.org/linux-cve-announce/2026050154-CVE-2026-43010-aef9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43011",
"url": "https://lore.kernel.org/linux-cve-announce/2026050155-CVE-2026-43011-dc56@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43012",
"url": "https://lore.kernel.org/linux-cve-announce/2026050155-CVE-2026-43012-a6fd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43013",
"url": "https://lore.kernel.org/linux-cve-announce/2026050155-CVE-2026-43013-be27@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43014",
"url": "https://lore.kernel.org/linux-cve-announce/2026050156-CVE-2026-43014-d106@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43015",
"url": "https://lore.kernel.org/linux-cve-announce/2026050156-CVE-2026-43015-9063@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43016",
"url": "https://lore.kernel.org/linux-cve-announce/2026050156-CVE-2026-43016-78fc@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43017",
"url": "https://lore.kernel.org/linux-cve-announce/2026050157-CVE-2026-43017-fefa@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43018",
"url": "https://lore.kernel.org/linux-cve-announce/2026050157-CVE-2026-43018-b74a@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43019",
"url": "https://lore.kernel.org/linux-cve-announce/2026050157-CVE-2026-43019-0c5c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43020",
"url": "https://lore.kernel.org/linux-cve-announce/2026050157-CVE-2026-43020-3561@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43021",
"url": "https://lore.kernel.org/linux-cve-announce/2026050158-CVE-2026-43021-ed82@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43022",
"url": "https://lore.kernel.org/linux-cve-announce/2026050158-CVE-2026-43022-00f0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43023",
"url": "https://lore.kernel.org/linux-cve-announce/2026050158-CVE-2026-43023-19eb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43024",
"url": "https://lore.kernel.org/linux-cve-announce/2026050159-CVE-2026-43024-9383@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43025",
"url": "https://lore.kernel.org/linux-cve-announce/2026050159-CVE-2026-43025-5b63@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43026",
"url": "https://lore.kernel.org/linux-cve-announce/2026050159-CVE-2026-43026-88d7@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43027",
"url": "https://lore.kernel.org/linux-cve-announce/2026050159-CVE-2026-43027-5711@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43028",
"url": "https://lore.kernel.org/linux-cve-announce/2026050100-CVE-2026-43028-bbeb@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43029",
"url": "https://lore.kernel.org/linux-cve-announce/2026050100-CVE-2026-43029-5cdf@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43030",
"url": "https://lore.kernel.org/linux-cve-announce/2026050100-CVE-2026-43030-58b8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43031",
"url": "https://lore.kernel.org/linux-cve-announce/2026050101-CVE-2026-43031-f267@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43032",
"url": "https://lore.kernel.org/linux-cve-announce/2026050101-CVE-2026-43032-a377@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43033",
"url": "https://lore.kernel.org/linux-cve-announce/2026050101-CVE-2026-43033-25c2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43034",
"url": "https://lore.kernel.org/linux-cve-announce/2026050102-CVE-2026-43034-f539@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43035",
"url": "https://lore.kernel.org/linux-cve-announce/2026050102-CVE-2026-43035-2731@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43036",
"url": "https://lore.kernel.org/linux-cve-announce/2026050102-CVE-2026-43036-1ff1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43037",
"url": "https://lore.kernel.org/linux-cve-announce/2026050102-CVE-2026-43037-0346@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43038",
"url": "https://lore.kernel.org/linux-cve-announce/2026050103-CVE-2026-43038-b591@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43039",
"url": "https://lore.kernel.org/linux-cve-announce/2026050103-CVE-2026-43039-ff5c@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43040",
"url": "https://lore.kernel.org/linux-cve-announce/2026050103-CVE-2026-43040-8fa0@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43041",
"url": "https://lore.kernel.org/linux-cve-announce/2026050104-CVE-2026-43041-eac4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43042",
"url": "https://lore.kernel.org/linux-cve-announce/2026050104-CVE-2026-43042-8e66@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43043",
"url": "https://lore.kernel.org/linux-cve-announce/2026050104-CVE-2026-43043-6997@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43044",
"url": "https://lore.kernel.org/linux-cve-announce/2026050104-CVE-2026-43044-36a8@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43045",
"url": "https://lore.kernel.org/linux-cve-announce/2026050105-CVE-2026-43045-de58@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43046",
"url": "https://lore.kernel.org/linux-cve-announce/2026050105-CVE-2026-43046-0fa9@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43047",
"url": "https://lore.kernel.org/linux-cve-announce/2026050105-CVE-2026-43047-13ab@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43048",
"url": "https://lore.kernel.org/linux-cve-announce/2026050106-CVE-2026-43048-ec58@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43049",
"url": "https://lore.kernel.org/linux-cve-announce/2026050106-CVE-2026-43049-224e@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43050",
"url": "https://lore.kernel.org/linux-cve-announce/2026050106-CVE-2026-43050-1cd2@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43051",
"url": "https://lore.kernel.org/linux-cve-announce/2026050107-CVE-2026-43051-0d15@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43052",
"url": "https://lore.kernel.org/linux-cve-announce/2026050107-CVE-2026-43052-10fe@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43053",
"url": "https://lore.kernel.org/linux-cve-announce/2026050107-CVE-2026-43053-7db1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43054",
"url": "https://lore.kernel.org/linux-cve-announce/2026050107-CVE-2026-43054-95b4@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43055",
"url": "https://lore.kernel.org/linux-cve-announce/2026050108-CVE-2026-43055-5bb1@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43056",
"url": "https://lore.kernel.org/linux-cve-announce/2026050108-CVE-2026-43056-fefd@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43057",
"url": "https://lore.kernel.org/linux-cve-announce/2026050108-CVE-2026-43057-4807@gregkh/"
},
{
"category": "external",
"summary": "Linux Kernel CVE Announcement CVE-2026-43058",
"url": "https://lore.kernel.org/linux-cve-announce/2026050254-CVE-2026-43058-4a86@gregkh/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6253 vom 2026-05-08",
"url": "https://lists.debian.org/debian-security-announce/2026/msg00164.html"
},
{
"category": "external",
"summary": "Microsoft Security Update Guide vom 2026-05-12",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50262 vom 2026-05-12",
"url": "https://linux.oracle.com/errata/ELSA-2026-50262.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50260 vom 2026-05-12",
"url": "https://linux.oracle.com/errata/ELSA-2026-50260.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-50261 vom 2026-05-12",
"url": "https://linux.oracle.com/errata/ELSA-2026-50261.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:10793-1 vom 2026-05-17",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BSZ44DGPO3T5P4RTV22AC4NIYWE4LZQN/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8277-1 vom 2026-05-20",
"url": "https://ubuntu.com/security/notices/USN-8277-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8278-1 vom 2026-05-20",
"url": "https://ubuntu.com/security/notices/USN-8278-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8279-1 vom 2026-05-20",
"url": "https://ubuntu.com/security/notices/USN-8279-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8281-1 vom 2026-05-20",
"url": "https://ubuntu.com/security/notices/USN-8281-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-8289-1 vom 2026-05-21",
"url": "https://ubuntu.com/security/notices/USN-8289-1"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-05-20T22:00:00.000+00:00",
"generator": {
"date": "2026-05-21T07:57:43.795+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.6.0"
}
},
"id": "WID-SEC-W-2026-1346",
"initial_release_date": "2026-05-03T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-05-03T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-05-10T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2026-05-11T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2026-05-12T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-05-17T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-05-19T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2026-05-20T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "7"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "azl3",
"product": {
"name": "Microsoft Azure Linux azl3",
"product_id": "T049210",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:azure_linux:azl3"
}
}
}
],
"category": "product_name",
"name": "Azure Linux"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Linux Kernel",
"product": {
"name": "Open Source Linux Kernel",
"product_id": "T028463",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:unspecified"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-23234",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-23234"
},
{
"cve": "CVE-2026-31693",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31693"
},
{
"cve": "CVE-2026-31694",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31694"
},
{
"cve": "CVE-2026-31695",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31695"
},
{
"cve": "CVE-2026-31696",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31696"
},
{
"cve": "CVE-2026-31697",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31697"
},
{
"cve": "CVE-2026-31698",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31698"
},
{
"cve": "CVE-2026-31699",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31699"
},
{
"cve": "CVE-2026-31700",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31700"
},
{
"cve": "CVE-2026-31701",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31701"
},
{
"cve": "CVE-2026-31702",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31702"
},
{
"cve": "CVE-2026-31703",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31703"
},
{
"cve": "CVE-2026-31704",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31704"
},
{
"cve": "CVE-2026-31705",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31705"
},
{
"cve": "CVE-2026-31706",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31706"
},
{
"cve": "CVE-2026-31707",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31707"
},
{
"cve": "CVE-2026-31708",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31708"
},
{
"cve": "CVE-2026-31709",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31709"
},
{
"cve": "CVE-2026-31710",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31710"
},
{
"cve": "CVE-2026-31711",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31711"
},
{
"cve": "CVE-2026-31712",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31712"
},
{
"cve": "CVE-2026-31713",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31713"
},
{
"cve": "CVE-2026-31714",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31714"
},
{
"cve": "CVE-2026-31715",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31715"
},
{
"cve": "CVE-2026-31716",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31716"
},
{
"cve": "CVE-2026-31717",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31717"
},
{
"cve": "CVE-2026-31718",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31718"
},
{
"cve": "CVE-2026-31719",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31719"
},
{
"cve": "CVE-2026-31720",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31720"
},
{
"cve": "CVE-2026-31721",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31721"
},
{
"cve": "CVE-2026-31722",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31722"
},
{
"cve": "CVE-2026-31723",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31723"
},
{
"cve": "CVE-2026-31724",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31724"
},
{
"cve": "CVE-2026-31725",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31725"
},
{
"cve": "CVE-2026-31726",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31726"
},
{
"cve": "CVE-2026-31727",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31727"
},
{
"cve": "CVE-2026-31728",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31728"
},
{
"cve": "CVE-2026-31729",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31729"
},
{
"cve": "CVE-2026-31730",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31730"
},
{
"cve": "CVE-2026-31731",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31731"
},
{
"cve": "CVE-2026-31732",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31732"
},
{
"cve": "CVE-2026-31733",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31733"
},
{
"cve": "CVE-2026-31734",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31734"
},
{
"cve": "CVE-2026-31735",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31735"
},
{
"cve": "CVE-2026-31736",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31736"
},
{
"cve": "CVE-2026-31737",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31737"
},
{
"cve": "CVE-2026-31738",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31738"
},
{
"cve": "CVE-2026-31739",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31739"
},
{
"cve": "CVE-2026-31740",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31740"
},
{
"cve": "CVE-2026-31741",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31741"
},
{
"cve": "CVE-2026-31742",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31742"
},
{
"cve": "CVE-2026-31743",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31743"
},
{
"cve": "CVE-2026-31744",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31744"
},
{
"cve": "CVE-2026-31745",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31745"
},
{
"cve": "CVE-2026-31746",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31746"
},
{
"cve": "CVE-2026-31747",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31747"
},
{
"cve": "CVE-2026-31748",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31748"
},
{
"cve": "CVE-2026-31749",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31749"
},
{
"cve": "CVE-2026-31750",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31750"
},
{
"cve": "CVE-2026-31751",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31751"
},
{
"cve": "CVE-2026-31752",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31752"
},
{
"cve": "CVE-2026-31753",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31753"
},
{
"cve": "CVE-2026-31754",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31754"
},
{
"cve": "CVE-2026-31755",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31755"
},
{
"cve": "CVE-2026-31756",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31756"
},
{
"cve": "CVE-2026-31757",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31757"
},
{
"cve": "CVE-2026-31758",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31758"
},
{
"cve": "CVE-2026-31759",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31759"
},
{
"cve": "CVE-2026-31760",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31760"
},
{
"cve": "CVE-2026-31761",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31761"
},
{
"cve": "CVE-2026-31762",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31762"
},
{
"cve": "CVE-2026-31763",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31763"
},
{
"cve": "CVE-2026-31764",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31764"
},
{
"cve": "CVE-2026-31766",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31766"
},
{
"cve": "CVE-2026-31767",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31767"
},
{
"cve": "CVE-2026-31768",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31768"
},
{
"cve": "CVE-2026-31769",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31769"
},
{
"cve": "CVE-2026-31770",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31770"
},
{
"cve": "CVE-2026-31771",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31771"
},
{
"cve": "CVE-2026-31772",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31772"
},
{
"cve": "CVE-2026-31773",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31773"
},
{
"cve": "CVE-2026-31774",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31774"
},
{
"cve": "CVE-2026-31775",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31775"
},
{
"cve": "CVE-2026-31776",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31776"
},
{
"cve": "CVE-2026-31777",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31777"
},
{
"cve": "CVE-2026-31778",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31778"
},
{
"cve": "CVE-2026-31779",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31779"
},
{
"cve": "CVE-2026-31780",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31780"
},
{
"cve": "CVE-2026-31781",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31781"
},
{
"cve": "CVE-2026-31782",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31782"
},
{
"cve": "CVE-2026-31783",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31783"
},
{
"cve": "CVE-2026-31784",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31784"
},
{
"cve": "CVE-2026-31785",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-31785"
},
{
"cve": "CVE-2026-43004",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43004"
},
{
"cve": "CVE-2026-43005",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43005"
},
{
"cve": "CVE-2026-43006",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43006"
},
{
"cve": "CVE-2026-43007",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43007"
},
{
"cve": "CVE-2026-43008",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43008"
},
{
"cve": "CVE-2026-43009",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43009"
},
{
"cve": "CVE-2026-43010",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43010"
},
{
"cve": "CVE-2026-43011",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43011"
},
{
"cve": "CVE-2026-43012",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43012"
},
{
"cve": "CVE-2026-43013",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43013"
},
{
"cve": "CVE-2026-43014",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43014"
},
{
"cve": "CVE-2026-43015",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43015"
},
{
"cve": "CVE-2026-43016",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43016"
},
{
"cve": "CVE-2026-43017",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43017"
},
{
"cve": "CVE-2026-43018",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43018"
},
{
"cve": "CVE-2026-43019",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43019"
},
{
"cve": "CVE-2026-43020",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43020"
},
{
"cve": "CVE-2026-43021",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43021"
},
{
"cve": "CVE-2026-43022",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43022"
},
{
"cve": "CVE-2026-43023",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43023"
},
{
"cve": "CVE-2026-43024",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43024"
},
{
"cve": "CVE-2026-43025",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43025"
},
{
"cve": "CVE-2026-43026",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43026"
},
{
"cve": "CVE-2026-43027",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43027"
},
{
"cve": "CVE-2026-43028",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43028"
},
{
"cve": "CVE-2026-43029",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43029"
},
{
"cve": "CVE-2026-43030",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43030"
},
{
"cve": "CVE-2026-43031",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43031"
},
{
"cve": "CVE-2026-43032",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43032"
},
{
"cve": "CVE-2026-43033",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43033"
},
{
"cve": "CVE-2026-43034",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43034"
},
{
"cve": "CVE-2026-43035",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43035"
},
{
"cve": "CVE-2026-43036",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43036"
},
{
"cve": "CVE-2026-43037",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43037"
},
{
"cve": "CVE-2026-43038",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43038"
},
{
"cve": "CVE-2026-43039",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43039"
},
{
"cve": "CVE-2026-43040",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43040"
},
{
"cve": "CVE-2026-43041",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43041"
},
{
"cve": "CVE-2026-43042",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43042"
},
{
"cve": "CVE-2026-43043",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43043"
},
{
"cve": "CVE-2026-43044",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43044"
},
{
"cve": "CVE-2026-43045",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43045"
},
{
"cve": "CVE-2026-43046",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43046"
},
{
"cve": "CVE-2026-43047",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43047"
},
{
"cve": "CVE-2026-43048",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43048"
},
{
"cve": "CVE-2026-43049",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43049"
},
{
"cve": "CVE-2026-43050",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43050"
},
{
"cve": "CVE-2026-43051",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43051"
},
{
"cve": "CVE-2026-43052",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43052"
},
{
"cve": "CVE-2026-43053",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43053"
},
{
"cve": "CVE-2026-43054",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43054"
},
{
"cve": "CVE-2026-43055",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43055"
},
{
"cve": "CVE-2026-43056",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43056"
},
{
"cve": "CVE-2026-43057",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43057"
},
{
"cve": "CVE-2026-43058",
"product_status": {
"known_affected": [
"T028463",
"2951",
"T000126",
"T027843",
"T049210",
"T004914"
]
},
"release_date": "2026-05-03T22:00:00.000+00:00",
"title": "CVE-2026-43058"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.