Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-43500 (GCVE-0-2026-43500)
Vulnerability from cvelistv5 – Published: 2026-05-11 06:26 – Updated: 2026-05-14 14:30- CWE-787 - Out-of-bounds Write
| Vendor | Product | Version | |
|---|---|---|---|
| Linux | Linux |
Affected:
d0d5c0cd1e711c98703f3544c1e6fc1372898de5 , < 3711382a77342a9a1c3d2e7330dcfc7ea927f568
(git)
Affected: d0d5c0cd1e711c98703f3544c1e6fc1372898de5 , < 3eae0f4f9f7206a4801efa5e0235c25bbd5a412c (git) Affected: d0d5c0cd1e711c98703f3544c1e6fc1372898de5 , < d45179f8795222ce858770dc619abe51f9d24411 (git) Affected: d0d5c0cd1e711c98703f3544c1e6fc1372898de5 , < aa54b1d27fe0c2b78e664a34fd0fdf7cd1960d71 (git) |
|
| Linux | Linux |
Affected:
5.3
Unaffected: 0 , < 5.3 (semver) Unaffected: 6.12.88 , ≤ 6.12.* (semver) Unaffected: 6.18.29 , ≤ 6.18.* (semver) Unaffected: 7.0.6 , ≤ 7.0.* (semver) Unaffected: 7.1-rc3 , ≤ * (original_commit_for_fix) |
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2026-43500",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-05-11T15:51:19.227001Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-05-11T15:53:36.563Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://github.com/V4bel/dirtyfrag"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Linux",
"programFiles": [
"net/rxrpc/call_event.c",
"net/rxrpc/conn_event.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"lessThan": "3711382a77342a9a1c3d2e7330dcfc7ea927f568",
"status": "affected",
"version": "d0d5c0cd1e711c98703f3544c1e6fc1372898de5",
"versionType": "git"
},
{
"lessThan": "3eae0f4f9f7206a4801efa5e0235c25bbd5a412c",
"status": "affected",
"version": "d0d5c0cd1e711c98703f3544c1e6fc1372898de5",
"versionType": "git"
},
{
"lessThan": "d45179f8795222ce858770dc619abe51f9d24411",
"status": "affected",
"version": "d0d5c0cd1e711c98703f3544c1e6fc1372898de5",
"versionType": "git"
},
{
"lessThan": "aa54b1d27fe0c2b78e664a34fd0fdf7cd1960d71",
"status": "affected",
"version": "d0d5c0cd1e711c98703f3544c1e6fc1372898de5",
"versionType": "git"
}
]
},
{
"defaultStatus": "affected",
"product": "Linux",
"programFiles": [
"net/rxrpc/call_event.c",
"net/rxrpc/conn_event.c"
],
"repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
"vendor": "Linux",
"versions": [
{
"status": "affected",
"version": "5.3"
},
{
"lessThan": "5.3",
"status": "unaffected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.12.*",
"status": "unaffected",
"version": "6.12.88",
"versionType": "semver"
},
{
"lessThanOrEqual": "6.18.*",
"status": "unaffected",
"version": "6.18.29",
"versionType": "semver"
},
{
"lessThanOrEqual": "7.0.*",
"status": "unaffected",
"version": "7.0.6",
"versionType": "semver"
},
{
"lessThanOrEqual": "*",
"status": "unaffected",
"version": "7.1-rc3",
"versionType": "original_commit_for_fix"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.88",
"versionStartIncluding": "5.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.18.29",
"versionStartIncluding": "5.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.0.6",
"versionStartIncluding": "5.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.1-rc3",
"versionStartIncluding": "5.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nrxrpc: Also unshare DATA/RESPONSE packets when paged frags are present\n\nThe DATA-packet handler in rxrpc_input_call_event() and the RESPONSE\nhandler in rxrpc_verify_response() copy the skb to a linear one before\ncalling into the security ops only when skb_cloned() is true. An skb\nthat is not cloned but still carries externally-owned paged fragments\n(e.g. SKBFL_SHARED_FRAG set by splice() into a UDP socket via\n__ip_append_data, or a chained skb_has_frag_list()) falls through to\nthe in-place decryption path, which binds the frag pages directly into\nthe AEAD/skcipher SGL via skb_to_sgvec().\n\nExtend the gate to also unshare when skb_has_frag_list() or\nskb_has_shared_frag() is true. This catches the splice-loopback vector\nand other externally-shared frag sources while preserving the\nzero-copy fast path for skbs whose frags are kernel-private (e.g. NIC\npage_pool RX, GRO). The OOM/trace handling already in place is reused."
}
],
"providerMetadata": {
"dateUpdated": "2026-05-14T14:30:15.829Z",
"orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"shortName": "Linux"
},
"references": [
{
"url": "https://git.kernel.org/stable/c/3711382a77342a9a1c3d2e7330dcfc7ea927f568"
},
{
"url": "https://git.kernel.org/stable/c/3eae0f4f9f7206a4801efa5e0235c25bbd5a412c"
},
{
"url": "https://git.kernel.org/stable/c/d45179f8795222ce858770dc619abe51f9d24411"
},
{
"url": "https://git.kernel.org/stable/c/aa54b1d27fe0c2b78e664a34fd0fdf7cd1960d71"
}
],
"title": "rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present",
"x_generator": {
"engine": "bippy-1.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"assignerShortName": "Linux",
"cveId": "CVE-2026-43500",
"datePublished": "2026-05-11T06:26:45.838Z",
"dateReserved": "2026-05-01T14:12:56.014Z",
"dateUpdated": "2026-05-14T14:30:15.829Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-43500",
"date": "2026-05-14",
"epss": "0.0001",
"percentile": "0.01153"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-43500\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-05-11T08:16:16.077\",\"lastModified\":\"2026-05-14T15:16:47.447\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nrxrpc: Also unshare DATA/RESPONSE packets when paged frags are present\\n\\nThe DATA-packet handler in rxrpc_input_call_event() and the RESPONSE\\nhandler in rxrpc_verify_response() copy the skb to a linear one before\\ncalling into the security ops only when skb_cloned() is true. An skb\\nthat is not cloned but still carries externally-owned paged fragments\\n(e.g. SKBFL_SHARED_FRAG set by splice() into a UDP socket via\\n__ip_append_data, or a chained skb_has_frag_list()) falls through to\\nthe in-place decryption path, which binds the frag pages directly into\\nthe AEAD/skcipher SGL via skb_to_sgvec().\\n\\nExtend the gate to also unshare when skb_has_frag_list() or\\nskb_has_shared_frag() is true. This catches the splice-loopback vector\\nand other externally-shared frag sources while preserving the\\nzero-copy fast path for skbs whose frags are kernel-private (e.g. NIC\\npage_pool RX, GRO). The OOM/trace handling already in place is reused.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartExcluding\":\"5.3\",\"versionEndExcluding\":\"6.18.29\",\"matchCriteriaId\":\"2F5215BD-689F-49B2-937A-9079FBEBB871\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.19\",\"versionEndExcluding\":\"7.0.6\",\"matchCriteriaId\":\"D1645824-82F2-4C95-994E-29C41C5F08B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D036D76E-AC69-4382-B4C1-8EDA1ABB2941\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.3:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"21001886-2C34-45F4-9319-60102B357E64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:5.3:rc8:*:*:*:*:*:*\",\"matchCriteriaId\":\"999345BA-F820-40B9-A711-32CA9265C289\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:7.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1EF7059-E670-45F4-B422-54C40FA86390\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:7.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D38F0BF-A728-4133-A358-D44A2F7EE6D6\"}]}]}],\"references\":[{\"url\":\"https://git.kernel.org/stable/c/3711382a77342a9a1c3d2e7330dcfc7ea927f568\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/3eae0f4f9f7206a4801efa5e0235c25bbd5a412c\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/aa54b1d27fe0c2b78e664a34fd0fdf7cd1960d71\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://git.kernel.org/stable/c/d45179f8795222ce858770dc619abe51f9d24411\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/V4bel/dirtyfrag\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-43500\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-05-11T15:51:19.227001Z\"}}}], \"references\": [{\"url\": \"https://github.com/V4bel/dirtyfrag\", \"tags\": [\"exploit\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787 Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-05-11T15:51:04.282Z\"}}], \"cna\": {\"title\": \"rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present\", \"affected\": [{\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"d0d5c0cd1e711c98703f3544c1e6fc1372898de5\", \"lessThan\": \"3711382a77342a9a1c3d2e7330dcfc7ea927f568\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d0d5c0cd1e711c98703f3544c1e6fc1372898de5\", \"lessThan\": \"3eae0f4f9f7206a4801efa5e0235c25bbd5a412c\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d0d5c0cd1e711c98703f3544c1e6fc1372898de5\", \"lessThan\": \"d45179f8795222ce858770dc619abe51f9d24411\", \"versionType\": \"git\"}, {\"status\": \"affected\", \"version\": \"d0d5c0cd1e711c98703f3544c1e6fc1372898de5\", \"lessThan\": \"aa54b1d27fe0c2b78e664a34fd0fdf7cd1960d71\", \"versionType\": \"git\"}], \"programFiles\": [\"net/rxrpc/call_event.c\", \"net/rxrpc/conn_event.c\"], \"defaultStatus\": \"unaffected\"}, {\"repo\": \"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git\", \"vendor\": \"Linux\", \"product\": \"Linux\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.3\"}, {\"status\": \"unaffected\", \"version\": \"0\", \"lessThan\": \"5.3\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.12.88\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.12.*\"}, {\"status\": \"unaffected\", \"version\": \"6.18.29\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"6.18.*\"}, {\"status\": \"unaffected\", \"version\": \"7.0.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"7.0.*\"}, {\"status\": \"unaffected\", \"version\": \"7.1-rc3\", \"versionType\": \"original_commit_for_fix\", \"lessThanOrEqual\": \"*\"}], \"programFiles\": [\"net/rxrpc/call_event.c\", \"net/rxrpc/conn_event.c\"], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://git.kernel.org/stable/c/3711382a77342a9a1c3d2e7330dcfc7ea927f568\"}, {\"url\": \"https://git.kernel.org/stable/c/3eae0f4f9f7206a4801efa5e0235c25bbd5a412c\"}, {\"url\": \"https://git.kernel.org/stable/c/d45179f8795222ce858770dc619abe51f9d24411\"}, {\"url\": \"https://git.kernel.org/stable/c/aa54b1d27fe0c2b78e664a34fd0fdf7cd1960d71\"}], \"x_generator\": {\"engine\": \"bippy-1.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"In the Linux kernel, the following vulnerability has been resolved:\\n\\nrxrpc: Also unshare DATA/RESPONSE packets when paged frags are present\\n\\nThe DATA-packet handler in rxrpc_input_call_event() and the RESPONSE\\nhandler in rxrpc_verify_response() copy the skb to a linear one before\\ncalling into the security ops only when skb_cloned() is true. An skb\\nthat is not cloned but still carries externally-owned paged fragments\\n(e.g. SKBFL_SHARED_FRAG set by splice() into a UDP socket via\\n__ip_append_data, or a chained skb_has_frag_list()) falls through to\\nthe in-place decryption path, which binds the frag pages directly into\\nthe AEAD/skcipher SGL via skb_to_sgvec().\\n\\nExtend the gate to also unshare when skb_has_frag_list() or\\nskb_has_shared_frag() is true. This catches the splice-loopback vector\\nand other externally-shared frag sources while preserving the\\nzero-copy fast path for skbs whose frags are kernel-private (e.g. NIC\\npage_pool RX, GRO). The OOM/trace handling already in place is reused.\"}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.12.88\", \"versionStartIncluding\": \"5.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.18.29\", \"versionStartIncluding\": \"5.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"7.0.6\", \"versionStartIncluding\": \"5.3\"}, {\"criteria\": \"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"7.1-rc3\", \"versionStartIncluding\": \"5.3\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"shortName\": \"Linux\", \"dateUpdated\": \"2026-05-14T14:30:15.829Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-43500\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-05-14T14:30:15.829Z\", \"dateReserved\": \"2026-05-01T14:12:56.014Z\", \"assignerOrgId\": \"416baaa9-dc9f-4396-8d5f-8c081fb06d67\", \"datePublished\": \"2026-05-11T06:26:45.838Z\", \"assignerShortName\": \"Linux\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
SUSE-SU-2026:1840-2
Vulnerability from csaf_suse - Published: 2026-05-13 15:10 - Updated: 2026-05-13 15:10| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP6 kernel was updated to fix the following issue:\n\n- CVE-2026-43284: xfrm: esp: avoid in-place decrypt on shared skb frags (bsc#1264449).\n- CVE-2026-43500: rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present (bsc#1264450).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1840,openSUSE-SLE-15.6-2026-1840",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1840-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1840-2",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261840-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1840-2",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-May/046428.html"
},
{
"category": "self",
"summary": "SUSE Bug 1264449",
"url": "https://bugzilla.suse.com/1264449"
},
{
"category": "self",
"summary": "SUSE Bug 1264450",
"url": "https://bugzilla.suse.com/1264450"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43284 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43284/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43500 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43500/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-05-13T15:10:10Z",
"generator": {
"date": "2026-05-13T15:10:10Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1840-2",
"initial_release_date": "2026-05-13T15:10:10Z",
"revision_history": [
{
"date": "2026-05-13T15:10:10Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product_id": "cluster-md-kmp-64kb-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product_id": "dlm-kmp-64kb-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product_id": "dlm-kmp-default-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-allwinner-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-allwinner-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-altera-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-altera-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amazon-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-amazon-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-amazon-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-amd-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-amd-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-amlogic-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-amlogic-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-apm-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-apm-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apple-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-apple-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-apple-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-arm-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-arm-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-broadcom-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-broadcom-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-cavium-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-cavium-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-exynos-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-exynos-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-freescale-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-freescale-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-hisilicon-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-hisilicon-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-lg-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-lg-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-marvell-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-marvell-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-mediatek-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-mediatek-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-nvidia-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-nvidia-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-qcom-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-qcom-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-renesas-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-renesas-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-rockchip-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-rockchip-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-socionext-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-socionext-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-sprd-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-sprd-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-xilinx-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-xilinx-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product_id": "gfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-64kb-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-64kb-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-64kb-extra-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-64kb-extra-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-64kb-optional-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-64kb-optional-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-default-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-default-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"product": {
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"product_id": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"product_id": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-default-devel-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-default-extra-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-default-optional-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-kvmsmall-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-obs-build-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-obs-qa-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-syms-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-syms-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product_id": "kselftests-kmp-64kb-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product_id": "ocfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product_id": "reiserfs-kmp-64kb-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.4.0-150600.23.103.1.noarch",
"product": {
"name": "kernel-devel-6.4.0-150600.23.103.1.noarch",
"product_id": "kernel-devel-6.4.0-150600.23.103.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-6.4.0-150600.23.103.1.noarch",
"product": {
"name": "kernel-docs-6.4.0-150600.23.103.1.noarch",
"product_id": "kernel-docs-6.4.0-150600.23.103.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-6.4.0-150600.23.103.1.noarch",
"product": {
"name": "kernel-docs-html-6.4.0-150600.23.103.1.noarch",
"product_id": "kernel-docs-html-6.4.0-150600.23.103.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.4.0-150600.23.103.1.noarch",
"product": {
"name": "kernel-macros-6.4.0-150600.23.103.1.noarch",
"product_id": "kernel-macros-6.4.0-150600.23.103.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.4.0-150600.23.103.1.noarch",
"product": {
"name": "kernel-source-6.4.0-150600.23.103.1.noarch",
"product_id": "kernel-source-6.4.0-150600.23.103.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.4.0-150600.23.103.1.noarch",
"product": {
"name": "kernel-source-vanilla-6.4.0-150600.23.103.1.noarch",
"product_id": "kernel-source-vanilla-6.4.0-150600.23.103.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product_id": "dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-debug-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-debug-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-debug-devel-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-debug-devel-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-default-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-default-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"product": {
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"product_id": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"product_id": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-default-devel-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-default-extra-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-default-optional-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-kvmsmall-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.ppc64le",
"product_id": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-obs-build-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-obs-qa-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-syms-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.s390x",
"product_id": "dlm-kmp-default-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-default-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-default-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-default-devel-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-default-extra-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-default-optional-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.s390x",
"product": {
"name": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.s390x",
"product_id": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-obs-build-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-obs-qa-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-syms-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-syms-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-zfcpdump-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-zfcpdump-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.s390x",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product_id": "dlm-kmp-default-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-debug-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-debug-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-debug-devel-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-debug-devel-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-vdso-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-debug-vdso-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-debug-vdso-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-default-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-default-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"product": {
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"product_id": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"product_id": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-default-devel-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-default-extra-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-default-optional-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-vdso-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-default-vdso-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-default-vdso-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-kvmsmall-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-vdso-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-kvmsmall-vdso-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-kvmsmall-vdso-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.x86_64",
"product_id": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-obs-build-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-obs-qa-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-syms-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-syms-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dlm-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-allwinner-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-allwinner-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-altera-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-altera-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amazon-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-amazon-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amd-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-amd-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amlogic-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-amlogic-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apm-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-apm-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apple-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-apple-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-arm-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-arm-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-broadcom-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-broadcom-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-cavium-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-cavium-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-exynos-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-exynos-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-freescale-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-freescale-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-hisilicon-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-hisilicon-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-lg-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-lg-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-marvell-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-marvell-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-mediatek-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-mediatek-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-nvidia-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-nvidia-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-qcom-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-qcom-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-renesas-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-renesas-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-rockchip-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-rockchip-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-socionext-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-socionext-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-sprd-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-sprd-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-xilinx-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dtb-xilinx-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "gfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-64kb-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-64kb-extra-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-64kb-optional-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-6.4.0-150600.23.103.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-debug-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-debug-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-6.4.0-150600.23.103.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-debug-devel-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-debug-devel-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-vdso-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-debug-vdso-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-default-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.103.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-default-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.103.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "kernel-default-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-default-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.aarch64"
},
"product_reference": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le"
},
"product_reference": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.x86_64"
},
"product_reference": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.103.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.103.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.103.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.103.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-default-extra-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.103.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.103.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-default-optional-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-vdso-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-default-vdso-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-150600.23.103.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.103.1.noarch"
},
"product_reference": "kernel-devel-6.4.0-150600.23.103.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.4.0-150600.23.103.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.103.1.noarch"
},
"product_reference": "kernel-docs-6.4.0-150600.23.103.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-6.4.0-150600.23.103.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.103.1.noarch"
},
"product_reference": "kernel-docs-html-6.4.0-150600.23.103.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-kvmsmall-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-150600.23.103.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-kvmsmall-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-vdso-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-kvmsmall-vdso-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-150600.23.103.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.103.1.noarch"
},
"product_reference": "kernel-macros-6.4.0-150600.23.103.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.103.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.103.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-obs-qa-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-150600.23.103.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.103.1.noarch"
},
"product_reference": "kernel-source-6.4.0-150600.23.103.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-6.4.0-150600.23.103.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.103.1.noarch"
},
"product_reference": "kernel-source-vanilla-6.4.0-150600.23.103.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.103.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.103.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "kernel-syms-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.4.0-150600.23.103.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "kernel-zfcpdump-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kselftests-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kselftests-kmp-default-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-64kb-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "reiserfs-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-43284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43284"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: esp: avoid in-place decrypt on shared skb frags\n\nMSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP\nmarks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(),\nso later paths that may modify packet data can first make a private\ncopy. The IPv4/IPv6 datagram append paths did not set this flag when\nsplicing pages into UDP skbs.\n\nThat leaves an ESP-in-UDP packet made from shared pipe pages looking\nlike an ordinary uncloned nonlinear skb. ESP input then takes the no-COW\nfast path for uncloned skbs without a frag_list and decrypts in place\nover data that is not owned privately by the skb.\n\nMark IPv4/IPv6 datagram splice frags with SKBFL_SHARED_FRAG, matching\nTCP. Also make ESP input fall back to skb_cow_data() when the flag is\npresent, so ESP does not decrypt externally backed frags in place.\nPrivate nonlinear skb frags still use the existing fast path.\n\nThis intentionally does not change ESP output. In esp_output_head(),\nthe path that appends the ESP trailer to existing skb tailroom without\ncalling skb_cow_data() is not reachable for nonlinear skbs:\nskb_tailroom() returns zero when skb-\u003edata_len is nonzero, while ESP\ntailen is positive. Thus ESP output will either use the separate\ndestination-frag path or fall back to skb_cow_data().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43284",
"url": "https://www.suse.com/security/cve/CVE-2026-43284"
},
{
"category": "external",
"summary": "SUSE Bug 1264449 for CVE-2026-43284",
"url": "https://bugzilla.suse.com/1264449"
},
{
"category": "external",
"summary": "SUSE Bug 1264459 for CVE-2026-43284",
"url": "https://bugzilla.suse.com/1264459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-13T15:10:10Z",
"details": "important"
}
],
"title": "CVE-2026-43284"
},
{
"cve": "CVE-2026-43500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43500"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrxrpc: Also unshare DATA/RESPONSE packets when paged frags are present\n\nThe DATA-packet handler in rxrpc_input_call_event() and the RESPONSE\nhandler in rxrpc_verify_response() copy the skb to a linear one before\ncalling into the security ops only when skb_cloned() is true. An skb\nthat is not cloned but still carries externally-owned paged fragments\n(e.g. SKBFL_SHARED_FRAG set by splice() into a UDP socket via\n__ip_append_data, or a chained skb_has_frag_list()) falls through to\nthe in-place decryption path, which binds the frag pages directly into\nthe AEAD/skcipher SGL via skb_to_sgvec().\n\nExtend the gate to also unshare when skb_has_frag_list() or\nskb_has_shared_frag() is true. This catches the splice-loopback vector\nand other externally-shared frag sources while preserving the\nzero-copy fast path for skbs whose frags are kernel-private (e.g. NIC\npage_pool RX, GRO). The OOM/trace handling already in place is reused.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43500",
"url": "https://www.suse.com/security/cve/CVE-2026-43500"
},
{
"category": "external",
"summary": "SUSE Bug 1264450 for CVE-2026-43500",
"url": "https://bugzilla.suse.com/1264450"
},
{
"category": "external",
"summary": "SUSE Bug 1264458 for CVE-2026-43500",
"url": "https://bugzilla.suse.com/1264458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.6:cluster-md-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:dlm-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:dtb-allwinner-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-altera-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-amazon-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-amd-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-amlogic-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-apm-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-apple-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-arm-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-broadcom-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-cavium-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-exynos-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-freescale-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-hisilicon-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-lg-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-marvell-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-mediatek-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-nvidia-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-qcom-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-renesas-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-rockchip-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-socionext-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-sprd-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:dtb-xilinx-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-extra-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-64kb-optional-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-debug-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-debug-vdso-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-extra-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-default-optional-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-default-vdso-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-devel-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-docs-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-docs-html-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-kvmsmall-devel-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-kvmsmall-vdso-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-macros-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-obs-qa-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-source-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-source-vanilla-6.4.0-150600.23.103.1.noarch",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kernel-syms-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:kernel-zfcpdump-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:kselftests-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:ocfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"openSUSE Leap 15.6:reiserfs-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x",
"openSUSE Leap 15.6:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-13T15:10:10Z",
"details": "important"
}
],
"title": "CVE-2026-43500"
}
]
}
SUSE-SU-2026:1778-1
Vulnerability from csaf_suse - Published: 2026-05-08 15:20 - Updated: 2026-05-08 15:20| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_44-rt-1-150700.1.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.44.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.44.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.44.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.44.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.44.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.44.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.44.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_44-rt-1-150700.1.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.44.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.44.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.44.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.44.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.44.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.44.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.44.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP7 RT kernel was updated to fix the following issue:\n\n\nThis fixes the DirtyFrag issues:\n\n- CVE-2026-43284: xfrm: esp: avoid in-place decrypt on shared skb frags (bsc#1264449).\n- CVE-2026-43500: rxrpc and afs modules are disabled (bsc#1264450)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1778,SUSE-SLE-Module-Live-Patching-15-SP7-2026-1778,SUSE-SLE-Module-RT-15-SP7-2026-1778",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1778-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1778-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261778-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1778-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-May/025946.html"
},
{
"category": "self",
"summary": "SUSE Bug 1264449",
"url": "https://bugzilla.suse.com/1264449"
},
{
"category": "self",
"summary": "SUSE Bug 1264450",
"url": "https://bugzilla.suse.com/1264450"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43284 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43284/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43500 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43500/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-05-08T15:20:22Z",
"generator": {
"date": "2026-05-08T15:20:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1778-1",
"initial_release_date": "2026-05-08T15:20:22Z",
"revision_history": [
{
"date": "2026-05-08T15:20:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-6.4.0-150700.7.44.1.noarch",
"product": {
"name": "kernel-devel-rt-6.4.0-150700.7.44.1.noarch",
"product_id": "kernel-devel-rt-6.4.0-150700.7.44.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-6.4.0-150700.7.44.1.noarch",
"product": {
"name": "kernel-source-rt-6.4.0-150700.7.44.1.noarch",
"product_id": "kernel-source-rt-6.4.0-150700.7.44.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"product_id": "cluster-md-kmp-rt-6.4.0-150700.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"product": {
"name": "dlm-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"product_id": "dlm-kmp-rt-6.4.0-150700.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"product_id": "gfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150700_7_44-rt-1-150700.1.3.1.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-150700_7_44-rt-1-150700.1.3.1.x86_64",
"product_id": "kernel-livepatch-6_4_0-150700_7_44-rt-1-150700.1.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-6.4.0-150700.7.44.1.x86_64",
"product": {
"name": "kernel-rt-6.4.0-150700.7.44.1.x86_64",
"product_id": "kernel-rt-6.4.0-150700.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-6.4.0-150700.7.44.1.x86_64",
"product": {
"name": "kernel-rt-devel-6.4.0-150700.7.44.1.x86_64",
"product_id": "kernel-rt-devel-6.4.0-150700.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-6.4.0-150700.7.44.1.x86_64",
"product": {
"name": "kernel-rt-extra-6.4.0-150700.7.44.1.x86_64",
"product_id": "kernel-rt-extra-6.4.0-150700.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-6.4.0-150700.7.44.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-6.4.0-150700.7.44.1.x86_64",
"product_id": "kernel-rt-livepatch-6.4.0-150700.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-6.4.0-150700.7.44.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-6.4.0-150700.7.44.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-6.4.0-150700.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-6.4.0-150700.7.44.1.x86_64",
"product": {
"name": "kernel-rt-optional-6.4.0-150700.7.44.1.x86_64",
"product_id": "kernel-rt-optional-6.4.0-150700.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-vdso-6.4.0-150700.7.44.1.x86_64",
"product": {
"name": "kernel-rt-vdso-6.4.0-150700.7.44.1.x86_64",
"product_id": "kernel-rt-vdso-6.4.0-150700.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-6.4.0-150700.7.44.1.x86_64",
"product": {
"name": "kernel-syms-rt-6.4.0-150700.7.44.1.x86_64",
"product_id": "kernel-syms-rt-6.4.0-150700.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"product_id": "kselftests-kmp-rt-6.4.0-150700.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"product_id": "ocfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"product_id": "reiserfs-kmp-rt-6.4.0-150700.7.44.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP7",
"product": {
"name": "SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150700_7_44-rt-1-150700.1.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP7",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_44-rt-1-150700.1.3.1.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-150700_7_44-rt-1-150700.1.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-6.4.0-150700.7.44.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.44.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-6.4.0-150700.7.44.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.44.1.x86_64"
},
"product_reference": "dlm-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-6.4.0-150700.7.44.1.noarch as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.44.1.noarch"
},
"product_reference": "kernel-devel-rt-6.4.0-150700.7.44.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-6.4.0-150700.7.44.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.44.1.x86_64"
},
"product_reference": "kernel-rt-6.4.0-150700.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-6.4.0-150700.7.44.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.44.1.x86_64"
},
"product_reference": "kernel-rt-devel-6.4.0-150700.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-6.4.0-150700.7.44.1.noarch as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.44.1.noarch"
},
"product_reference": "kernel-source-rt-6.4.0-150700.7.44.1.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-6.4.0-150700.7.44.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.44.1.x86_64"
},
"product_reference": "kernel-syms-rt-6.4.0-150700.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64 as component of SUSE Real Time Module 15 SP7",
"product_id": "SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-43284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43284"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: esp: avoid in-place decrypt on shared skb frags\n\nMSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP\nmarks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(),\nso later paths that may modify packet data can first make a private\ncopy. The IPv4/IPv6 datagram append paths did not set this flag when\nsplicing pages into UDP skbs.\n\nThat leaves an ESP-in-UDP packet made from shared pipe pages looking\nlike an ordinary uncloned nonlinear skb. ESP input then takes the no-COW\nfast path for uncloned skbs without a frag_list and decrypts in place\nover data that is not owned privately by the skb.\n\nMark IPv4/IPv6 datagram splice frags with SKBFL_SHARED_FRAG, matching\nTCP. Also make ESP input fall back to skb_cow_data() when the flag is\npresent, so ESP does not decrypt externally backed frags in place.\nPrivate nonlinear skb frags still use the existing fast path.\n\nThis intentionally does not change ESP output. In esp_output_head(),\nthe path that appends the ESP trailer to existing skb tailroom without\ncalling skb_cow_data() is not reachable for nonlinear skbs:\nskb_tailroom() returns zero when skb-\u003edata_len is nonzero, while ESP\ntailen is positive. Thus ESP output will either use the separate\ndestination-frag path or fall back to skb_cow_data().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_44-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.44.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.44.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43284",
"url": "https://www.suse.com/security/cve/CVE-2026-43284"
},
{
"category": "external",
"summary": "SUSE Bug 1264449 for CVE-2026-43284",
"url": "https://bugzilla.suse.com/1264449"
},
{
"category": "external",
"summary": "SUSE Bug 1264459 for CVE-2026-43284",
"url": "https://bugzilla.suse.com/1264459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_44-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.44.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.44.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_44-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.44.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.44.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-08T15:20:22Z",
"details": "important"
}
],
"title": "CVE-2026-43284"
},
{
"cve": "CVE-2026-43500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43500"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_44-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.44.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.44.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43500",
"url": "https://www.suse.com/security/cve/CVE-2026-43500"
},
{
"category": "external",
"summary": "SUSE Bug 1264450 for CVE-2026-43500",
"url": "https://bugzilla.suse.com/1264450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_44-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.44.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.44.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP7:kernel-livepatch-6_4_0-150700_7_44-rt-1-150700.1.3.1.x86_64",
"SUSE Real Time Module 15 SP7:cluster-md-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:dlm-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:gfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-devel-rt-6.4.0-150700.7.44.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-rt-devel-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:kernel-source-rt-6.4.0-150700.7.44.1.noarch",
"SUSE Real Time Module 15 SP7:kernel-syms-rt-6.4.0-150700.7.44.1.x86_64",
"SUSE Real Time Module 15 SP7:ocfs2-kmp-rt-6.4.0-150700.7.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-08T15:20:22Z",
"details": "important"
}
],
"title": "CVE-2026-43500"
}
]
}
SUSE-SU-2026:1840-1
Vulnerability from csaf_suse - Published: 2026-05-13 10:05 - Updated: 2026-05-13 10:05| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.103.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP6 kernel was updated to fix the following issue:\n\n- CVE-2026-43284: xfrm: esp: avoid in-place decrypt on shared skb frags (bsc#1264449).\n- CVE-2026-43500: rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present (bsc#1264450).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1840,SUSE-SLE-Module-Live-Patching-15-SP6-2026-1840,SUSE-SLE-Product-HA-15-SP6-2026-1840,SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1840,SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1840",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1840-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1840-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261840-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1840-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2026-May/046405.html"
},
{
"category": "self",
"summary": "SUSE Bug 1264449",
"url": "https://bugzilla.suse.com/1264449"
},
{
"category": "self",
"summary": "SUSE Bug 1264450",
"url": "https://bugzilla.suse.com/1264450"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43284 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43284/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-43500 page",
"url": "https://www.suse.com/security/cve/CVE-2026-43500/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2026-05-13T10:05:20Z",
"generator": {
"date": "2026-05-13T10:05:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1840-1",
"initial_release_date": "2026-05-13T10:05:20Z",
"revision_history": [
{
"date": "2026-05-13T10:05:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product_id": "cluster-md-kmp-64kb-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product_id": "dlm-kmp-64kb-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product_id": "dlm-kmp-default-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-allwinner-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-allwinner-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-altera-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-altera-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amazon-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-amazon-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-amazon-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-amd-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-amd-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-amlogic-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-amlogic-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-apm-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-apm-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apple-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-apple-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-apple-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-arm-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-arm-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-broadcom-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-broadcom-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-cavium-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-cavium-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-exynos-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-exynos-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-freescale-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-freescale-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-hisilicon-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-hisilicon-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-lg-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-lg-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-marvell-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-marvell-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-mediatek-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-mediatek-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-nvidia-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-nvidia-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-qcom-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-qcom-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-renesas-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-renesas-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-rockchip-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-rockchip-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-socionext-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-socionext-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-sprd-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-sprd-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "dtb-xilinx-6.4.0-150600.23.103.1.aarch64",
"product_id": "dtb-xilinx-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product_id": "gfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-64kb-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-64kb-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-64kb-extra-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-64kb-extra-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-64kb-optional-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-64kb-optional-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-default-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-default-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"product": {
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"product_id": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"product_id": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-default-devel-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-default-extra-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-default-optional-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-kvmsmall-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-obs-build-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-obs-qa-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kernel-syms-6.4.0-150600.23.103.1.aarch64",
"product_id": "kernel-syms-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product_id": "kselftests-kmp-64kb-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product_id": "ocfs2-kmp-64kb-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-6.4.0-150600.23.103.1.aarch64",
"product_id": "reiserfs-kmp-64kb-6.4.0-150600.23.103.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-6.4.0-150600.23.103.1.noarch",
"product": {
"name": "kernel-devel-6.4.0-150600.23.103.1.noarch",
"product_id": "kernel-devel-6.4.0-150600.23.103.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-6.4.0-150600.23.103.1.noarch",
"product": {
"name": "kernel-docs-6.4.0-150600.23.103.1.noarch",
"product_id": "kernel-docs-6.4.0-150600.23.103.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-6.4.0-150600.23.103.1.noarch",
"product": {
"name": "kernel-docs-html-6.4.0-150600.23.103.1.noarch",
"product_id": "kernel-docs-html-6.4.0-150600.23.103.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-6.4.0-150600.23.103.1.noarch",
"product": {
"name": "kernel-macros-6.4.0-150600.23.103.1.noarch",
"product_id": "kernel-macros-6.4.0-150600.23.103.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-6.4.0-150600.23.103.1.noarch",
"product": {
"name": "kernel-source-6.4.0-150600.23.103.1.noarch",
"product_id": "kernel-source-6.4.0-150600.23.103.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-6.4.0-150600.23.103.1.noarch",
"product": {
"name": "kernel-source-vanilla-6.4.0-150600.23.103.1.noarch",
"product_id": "kernel-source-vanilla-6.4.0-150600.23.103.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product_id": "dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-debug-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-debug-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-debug-devel-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-debug-devel-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-default-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-default-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"product": {
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"product_id": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"product_id": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-default-devel-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-default-extra-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-default-optional-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-kvmsmall-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.ppc64le",
"product_id": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-obs-build-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-obs-qa-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kernel-syms-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.s390x",
"product_id": "dlm-kmp-default-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-default-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-default-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-default-devel-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-default-extra-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-default-optional-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.s390x",
"product": {
"name": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.s390x",
"product_id": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-obs-build-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-obs-qa-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-syms-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-syms-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kernel-zfcpdump-6.4.0-150600.23.103.1.s390x",
"product_id": "kernel-zfcpdump-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.s390x",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product_id": "cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product_id": "dlm-kmp-default-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product_id": "gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-debug-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-debug-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-debug-devel-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-debug-devel-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-vdso-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-debug-vdso-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-debug-vdso-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-default-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-default-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"product": {
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"product_id": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"product_id": "kernel-default-base-rebuild-6.4.0-150600.23.103.1.150600.12.48.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-default-devel-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-default-extra-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-default-extra-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-default-optional-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-default-optional-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-vdso-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-default-vdso-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-default-vdso-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-kvmsmall-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-kvmsmall-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-kvmsmall-devel-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-vdso-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-kvmsmall-vdso-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-kvmsmall-vdso-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.x86_64",
"product": {
"name": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.x86_64",
"product_id": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-obs-build-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-obs-qa-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-obs-qa-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kernel-syms-6.4.0-150600.23.103.1.x86_64",
"product_id": "kernel-syms-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "kselftests-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product_id": "kselftests-kmp-default-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product_id": "ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64",
"product_id": "reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.s390x"
},
"product_reference": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP6",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.x86_64"
},
"product_reference": "kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-6.4.0-150600.23.103.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-64kb-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.103.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-default-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-default-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.103.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "kernel-default-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-default-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.103.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.103.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-150600.23.103.1.noarch as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.103.1.noarch"
},
"product_reference": "kernel-devel-6.4.0-150600.23.103.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.4.0-150600.23.103.1.noarch as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.103.1.noarch"
},
"product_reference": "kernel-docs-6.4.0-150600.23.103.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-150600.23.103.1.noarch as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.103.1.noarch"
},
"product_reference": "kernel-macros-6.4.0-150600.23.103.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.103.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.103.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-150600.23.103.1.noarch as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.103.1.noarch"
},
"product_reference": "kernel-source-6.4.0-150600.23.103.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.103.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.103.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "kernel-syms-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-6.4.0-150600.23.103.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "kernel-zfcpdump-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP6-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP6-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-default-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-default-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64"
},
"product_reference": "kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-6.4.0-150600.23.103.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.103.1.noarch"
},
"product_reference": "kernel-devel-6.4.0-150600.23.103.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-6.4.0-150600.23.103.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.103.1.noarch"
},
"product_reference": "kernel-docs-6.4.0-150600.23.103.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-6.4.0-150600.23.103.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.103.1.noarch"
},
"product_reference": "kernel-macros-6.4.0-150600.23.103.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-6.4.0-150600.23.103.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.103.1.noarch"
},
"product_reference": "kernel-source-6.4.0-150600.23.103.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "kernel-syms-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-43284",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43284"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: esp: avoid in-place decrypt on shared skb frags\n\nMSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP\nmarks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(),\nso later paths that may modify packet data can first make a private\ncopy. The IPv4/IPv6 datagram append paths did not set this flag when\nsplicing pages into UDP skbs.\n\nThat leaves an ESP-in-UDP packet made from shared pipe pages looking\nlike an ordinary uncloned nonlinear skb. ESP input then takes the no-COW\nfast path for uncloned skbs without a frag_list and decrypts in place\nover data that is not owned privately by the skb.\n\nMark IPv4/IPv6 datagram splice frags with SKBFL_SHARED_FRAG, matching\nTCP. Also make ESP input fall back to skb_cow_data() when the flag is\npresent, so ESP does not decrypt externally backed frags in place.\nPrivate nonlinear skb frags still use the existing fast path.\n\nThis intentionally does not change ESP output. In esp_output_head(),\nthe path that appends the ESP trailer to existing skb tailroom without\ncalling skb_cow_data() is not reachable for nonlinear skbs:\nskb_tailroom() returns zero when skb-\u003edata_len is nonzero, while ESP\ntailen is positive. Thus ESP output will either use the separate\ndestination-frag path or fall back to skb_cow_data().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43284",
"url": "https://www.suse.com/security/cve/CVE-2026-43284"
},
{
"category": "external",
"summary": "SUSE Bug 1264449 for CVE-2026-43284",
"url": "https://bugzilla.suse.com/1264449"
},
{
"category": "external",
"summary": "SUSE Bug 1264459 for CVE-2026-43284",
"url": "https://bugzilla.suse.com/1264459"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-13T10:05:20Z",
"details": "important"
}
],
"title": "CVE-2026-43284"
},
{
"cve": "CVE-2026-43500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-43500"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrxrpc: Also unshare DATA/RESPONSE packets when paged frags are present\n\nThe DATA-packet handler in rxrpc_input_call_event() and the RESPONSE\nhandler in rxrpc_verify_response() copy the skb to a linear one before\ncalling into the security ops only when skb_cloned() is true. An skb\nthat is not cloned but still carries externally-owned paged fragments\n(e.g. SKBFL_SHARED_FRAG set by splice() into a UDP socket via\n__ip_append_data, or a chained skb_has_frag_list()) falls through to\nthe in-place decryption path, which binds the frag pages directly into\nthe AEAD/skcipher SGL via skb_to_sgvec().\n\nExtend the gate to also unshare when skb_has_frag_list() or\nskb_has_shared_frag() is true. This catches the splice-loopback vector\nand other externally-shared frag sources while preserving the\nzero-copy fast path for skbs whose frags are kernel-private (e.g. NIC\npage_pool RX, GRO). The OOM/trace handling already in place is reused.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-43500",
"url": "https://www.suse.com/security/cve/CVE-2026-43500"
},
{
"category": "external",
"summary": "SUSE Bug 1264450 for CVE-2026-43500",
"url": "https://bugzilla.suse.com/1264450"
},
{
"category": "external",
"summary": "SUSE Bug 1264458 for CVE-2026-43500",
"url": "https://bugzilla.suse.com/1264458"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-default-livepatch-devel-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP6:kernel-livepatch-6_4_0-150600_23_103-default-1-150600.13.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-64kb-devel-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-devel-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-docs-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-macros-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-source-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-syms-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:kernel-zfcpdump-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.aarch64",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.s390x",
"SUSE Linux Enterprise Server 15 SP6-LTSS:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:cluster-md-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:dlm-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:gfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-base-6.4.0-150600.23.103.1.150600.12.48.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-default-devel-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-devel-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-docs-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-macros-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-obs-build-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-source-6.4.0-150600.23.103.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:kernel-syms-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:ocfs2-kmp-default-6.4.0-150600.23.103.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.103.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP6:reiserfs-kmp-default-6.4.0-150600.23.103.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-05-13T10:05:20Z",
"details": "important"
}
],
"title": "CVE-2026-43500"
}
]
}
FKIE_CVE-2026-43500
Vulnerability from fkie_nvd - Published: 2026-05-11 08:16 - Updated: 2026-05-14 15:167.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| linux | linux_kernel | * | |
| linux | linux_kernel | 5.3 | |
| linux | linux_kernel | 5.3 | |
| linux | linux_kernel | 5.3 | |
| linux | linux_kernel | 7.1 | |
| linux | linux_kernel | 7.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2F5215BD-689F-49B2-937A-9079FBEBB871",
"versionEndExcluding": "6.18.29",
"versionStartExcluding": "5.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D1645824-82F2-4C95-994E-29C41C5F08B7",
"versionEndExcluding": "7.0.6",
"versionStartIncluding": "6.19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:5.3:-:*:*:*:*:*:*",
"matchCriteriaId": "D036D76E-AC69-4382-B4C1-8EDA1ABB2941",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:5.3:rc7:*:*:*:*:*:*",
"matchCriteriaId": "21001886-2C34-45F4-9319-60102B357E64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:5.3:rc8:*:*:*:*:*:*",
"matchCriteriaId": "999345BA-F820-40B9-A711-32CA9265C289",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:7.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B1EF7059-E670-45F4-B422-54C40FA86390",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:7.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D38F0BF-A728-4133-A358-D44A2F7EE6D6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nrxrpc: Also unshare DATA/RESPONSE packets when paged frags are present\n\nThe DATA-packet handler in rxrpc_input_call_event() and the RESPONSE\nhandler in rxrpc_verify_response() copy the skb to a linear one before\ncalling into the security ops only when skb_cloned() is true. An skb\nthat is not cloned but still carries externally-owned paged fragments\n(e.g. SKBFL_SHARED_FRAG set by splice() into a UDP socket via\n__ip_append_data, or a chained skb_has_frag_list()) falls through to\nthe in-place decryption path, which binds the frag pages directly into\nthe AEAD/skcipher SGL via skb_to_sgvec().\n\nExtend the gate to also unshare when skb_has_frag_list() or\nskb_has_shared_frag() is true. This catches the splice-loopback vector\nand other externally-shared frag sources while preserving the\nzero-copy fast path for skbs whose frags are kernel-private (e.g. NIC\npage_pool RX, GRO). The OOM/trace handling already in place is reused."
}
],
"id": "CVE-2026-43500",
"lastModified": "2026-05-14T15:16:47.447",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-05-11T08:16:16.077",
"references": [
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"url": "https://git.kernel.org/stable/c/3711382a77342a9a1c3d2e7330dcfc7ea927f568"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/3eae0f4f9f7206a4801efa5e0235c25bbd5a412c"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/aa54b1d27fe0c2b78e664a34fd0fdf7cd1960d71"
},
{
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
],
"url": "https://git.kernel.org/stable/c/d45179f8795222ce858770dc619abe51f9d24411"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"url": "https://github.com/V4bel/dirtyfrag"
}
],
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-8P2W-G92W-F4X3
Vulnerability from github – Published: 2026-05-11 09:30 – Updated: 2026-05-14 15:31In the Linux kernel, the following vulnerability has been resolved:
rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present
The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE handler in rxrpc_verify_response() copy the skb to a linear one before calling into the security ops only when skb_cloned() is true. An skb that is not cloned but still carries externally-owned paged fragments (e.g. SKBFL_SHARED_FRAG set by splice() into a UDP socket via __ip_append_data, or a chained skb_has_frag_list()) falls through to the in-place decryption path, which binds the frag pages directly into the AEAD/skcipher SGL via skb_to_sgvec().
Extend the gate to also unshare when skb_has_frag_list() or skb_has_shared_frag() is true. This catches the splice-loopback vector and other externally-shared frag sources while preserving the zero-copy fast path for skbs whose frags are kernel-private (e.g. NIC page_pool RX, GRO). The OOM/trace handling already in place is reused.
{
"affected": [],
"aliases": [
"CVE-2026-43500"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-05-11T08:16:16Z",
"severity": "HIGH"
},
"details": "In the Linux kernel, the following vulnerability has been resolved:\n\nrxrpc: Also unshare DATA/RESPONSE packets when paged frags are present\n\nThe DATA-packet handler in rxrpc_input_call_event() and the RESPONSE\nhandler in rxrpc_verify_response() copy the skb to a linear one before\ncalling into the security ops only when skb_cloned() is true. An skb\nthat is not cloned but still carries externally-owned paged fragments\n(e.g. SKBFL_SHARED_FRAG set by splice() into a UDP socket via\n__ip_append_data, or a chained skb_has_frag_list()) falls through to\nthe in-place decryption path, which binds the frag pages directly into\nthe AEAD/skcipher SGL via skb_to_sgvec().\n\nExtend the gate to also unshare when skb_has_frag_list() or\nskb_has_shared_frag() is true. This catches the splice-loopback vector\nand other externally-shared frag sources while preserving the\nzero-copy fast path for skbs whose frags are kernel-private (e.g. NIC\npage_pool RX, GRO). The OOM/trace handling already in place is reused.",
"id": "GHSA-8p2w-g92w-f4x3",
"modified": "2026-05-14T15:31:52Z",
"published": "2026-05-11T09:30:32Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-43500"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/3711382a77342a9a1c3d2e7330dcfc7ea927f568"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/3eae0f4f9f7206a4801efa5e0235c25bbd5a412c"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/aa54b1d27fe0c2b78e664a34fd0fdf7cd1960d71"
},
{
"type": "WEB",
"url": "https://git.kernel.org/stable/c/d45179f8795222ce858770dc619abe51f9d24411"
},
{
"type": "WEB",
"url": "https://github.com/V4bel/dirtyfrag"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2026-1430
Vulnerability from csaf_certbund - Published: 2026-05-07 22:00 - Updated: 2026-05-10 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel <6.6.138
Open Source / Linux Kernel
|
<6.6.138 | ||
|
Open Source Linux Kernel <7.0.5
Open Source / Linux Kernel
|
<7.0.5 | ||
|
Open Source Linux Kernel <6.12.87
Open Source / Linux Kernel
|
<6.12.87 | ||
|
Open Source Linux Kernel <6.18.28
Open Source / Linux Kernel
|
<6.18.28 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel <=7.0.4
Open Source / Linux Kernel
|
<=7.0.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel <6.6.138
Open Source / Linux Kernel
|
<6.6.138 | ||
|
Open Source Linux Kernel <7.0.5
Open Source / Linux Kernel
|
<7.0.5 | ||
|
Open Source Linux Kernel <6.12.87
Open Source / Linux Kernel
|
<6.12.87 | ||
|
Open Source Linux Kernel <6.18.28
Open Source / Linux Kernel
|
<6.18.28 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Linux Kernel <=7.0.4
Open Source / Linux Kernel
|
<=7.0.4 |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um Administratorrechte zu erlangen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-1430 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-1430.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-1430 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-1430"
},
{
"category": "external",
"summary": "DirtyFrag GitHub vom 2026-05-07",
"url": "https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md"
},
{
"category": "external",
"summary": "Microsoft Security Blog vom 2026-05-10",
"url": "https://www.microsoft.com/en-us/security/blog/2026/05/08/active-attack-dirty-frag-linux-vulnerability-expands-post-compromise-risk/"
}
],
"source_lang": "en-US",
"title": "Linux Kernel (Dirty Frag): Mehrere Schwachstellen erm\u00f6glichen Erlangen von Administratorrechten",
"tracking": {
"current_release_date": "2026-05-10T22:00:00.000+00:00",
"generator": {
"date": "2026-05-11T05:51:16.715+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-1430",
"initial_release_date": "2026-05-07T22:00:00.000+00:00",
"revision_history": [
{
"date": "2026-05-07T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-05-10T22:00:00.000+00:00",
"number": "2",
"summary": "Bericht zu aktiver Ausnutzung erg\u00e4nzt (Microsoft Security Blog)"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=7.0.4",
"product": {
"name": "Open Source Linux Kernel \u003c=7.0.4",
"product_id": "T053686"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.0.4",
"product": {
"name": "Open Source Linux Kernel \u003c=7.0.4",
"product_id": "T053686-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c6.6.138",
"product": {
"name": "Open Source Linux Kernel \u003c6.6.138",
"product_id": "T053694"
}
},
{
"category": "product_version",
"name": "6.6.138",
"product": {
"name": "Open Source Linux Kernel 6.6.138",
"product_id": "T053694-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:6.6.138"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.12.87",
"product": {
"name": "Open Source Linux Kernel \u003c6.12.87",
"product_id": "T053695"
}
},
{
"category": "product_version",
"name": "6.12.87",
"product": {
"name": "Open Source Linux Kernel 6.12.87",
"product_id": "T053695-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:6.12.87"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.18.28",
"product": {
"name": "Open Source Linux Kernel \u003c6.18.28",
"product_id": "T053696"
}
},
{
"category": "product_version",
"name": "6.18.28",
"product": {
"name": "Open Source Linux Kernel 6.18.28",
"product_id": "T053696-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:6.18.28"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.0.5",
"product": {
"name": "Open Source Linux Kernel \u003c7.0.5",
"product_id": "T053697"
}
},
{
"category": "product_version",
"name": "7.0.5",
"product": {
"name": "Open Source Linux Kernel 7.0.5",
"product_id": "T053697-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:linux:linux_kernel:7.0.5"
}
}
}
],
"category": "product_name",
"name": "Linux Kernel"
}
],
"category": "vendor",
"name": "Open Source"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-43284",
"product_status": {
"known_affected": [
"T053694",
"T053697",
"T053695",
"T053696"
],
"last_affected": [
"T053686"
]
},
"release_date": "2026-05-07T22:00:00.000+00:00",
"title": "CVE-2026-43284"
},
{
"cve": "CVE-2026-43500",
"product_status": {
"known_affected": [
"T053694",
"T053697",
"T053695",
"T053696"
],
"last_affected": [
"T053686"
]
},
"release_date": "2026-05-07T22:00:00.000+00:00",
"title": "CVE-2026-43500"
}
]
}
MSRC_CVE-2026-43500
Vulnerability from csaf_microsoft - Published: 2026-05-02 00:00 - Updated: 2026-05-12 01:07| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17084-1 | — |
None Available
|
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2026/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2026-43500 rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-43500.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present",
"tracking": {
"current_release_date": "2026-05-12T01:07:26.000Z",
"generator": {
"date": "2026-05-12T07:08:45.082Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2026-43500",
"initial_release_date": "2026-05-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-05-12T01:07:26.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "azl3 kernel 0:6.6.138.1-1.azl3",
"product": {
"name": "azl3 kernel 0:6.6.138.1-1.azl3",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "kernel"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kernel 0:6.6.138.1-1.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-43500",
"notes": [
{
"category": "general",
"text": "Linux",
"title": "Assigning CNA"
}
],
"product_status": {
"known_affected": [
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-43500 rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2026-43500.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2026-05-12T01:07:26.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-1"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"17084-1"
]
}
],
"title": "rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.