SUSE-SU-2026:1668-1

Vulnerability from csaf_suse - Published: 2026-05-01 08:37 - Updated: 2026-05-01 08:37
Summary
Security update for the Linux Kernel
Severity
Important
Notes
Title of the patch: Security update for the Linux Kernel
Description of the patch: The SUSE Linux Enterprise 12 SP5 kernel was updated to fix various security issues The following security issues were fixed: - CVE-2024-26584: net/tls: return ENOTSUPP on tls_init() (bsc#1220186). - CVE-2025-38234: sched/rt: Fix race in push_rt_task (bsc#1246057). - CVE-2025-39759: btrfs: qgroup: fix race between quota disable and quota rescan ioctl (bsc#1249522). - CVE-2025-71268: btrfs: fix reservation leak in some error paths when inserting inline extent (bsc#1259865). - CVE-2025-71269: btrfs: do not free data reservation in fallback from inline due to -ENOSPC (bsc#1259889). - CVE-2026-22990: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() (bsc#1257221). - CVE-2026-23103: ipvlan: Make the addrs_lock be per port (bsc#1257773). - CVE-2026-23120: l2tp: avoid one data-race in l2tp_tunnel_del_work() (bsc#1258280). - CVE-2026-23243: RDMA/umad: Reject negative data_len in ib_umad_write (bsc#1259797). - CVE-2026-23262: gve: Fix stats report corruption on queue count change (bsc#1259870). - CVE-2026-23272: netfilter: nf_tables: unconditionally bump set-nelems before insertion (bsc#1260009). - CVE-2026-23277: net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit (bsc#1259997). - CVE-2026-23318: ALSA: usb-audio: Use correct version for UAC3 header validation (bsc#1260536). - CVE-2026-23362: can: bcm: fix locking for bcm_op runtime updates (bsc#1260489). - CVE-2026-23382: HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them (bsc#1260551). - CVE-2026-23386: gve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL (bsc#1260799). - CVE-2026-23398: icmp: fix NULL pointer dereference in icmp_tag_validation() (bsc#1260730). The following non security issues were fixed: - btrfs: fix processing of delayed data refs during backref walking (bsc#1228031). - fs: skip superblock shrink on frozen xfs filesystems (bsc#1259770).
Patchnames: SUSE-2026-1668,SUSE-SLE-Live-Patching-12-SP5-2026-1668,SUSE-SLE-SERVER-12-SP5-LTSS-2026-1668,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-1668
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
https://www.suse.com/support/security/rating/ external
https://ftp.suse.com/pub/projects/security/csaf/s… self
https://www.suse.com/support/update/announcement/… self
https://lists.suse.com/pipermail/sle-updates/2026… self
https://bugzilla.suse.com/1220186 self
https://bugzilla.suse.com/1228031 self
https://bugzilla.suse.com/1246057 self
https://bugzilla.suse.com/1249522 self
https://bugzilla.suse.com/1257221 self
https://bugzilla.suse.com/1257773 self
https://bugzilla.suse.com/1258280 self
https://bugzilla.suse.com/1259770 self
https://bugzilla.suse.com/1259797 self
https://bugzilla.suse.com/1259865 self
https://bugzilla.suse.com/1259870 self
https://bugzilla.suse.com/1259889 self
https://bugzilla.suse.com/1259997 self
https://bugzilla.suse.com/1260009 self
https://bugzilla.suse.com/1260489 self
https://bugzilla.suse.com/1260536 self
https://bugzilla.suse.com/1260551 self
https://bugzilla.suse.com/1260730 self
https://bugzilla.suse.com/1260799 self
https://www.suse.com/security/cve/CVE-2024-26584/ self
https://www.suse.com/security/cve/CVE-2025-38234/ self
https://www.suse.com/security/cve/CVE-2025-39759/ self
https://www.suse.com/security/cve/CVE-2025-71268/ self
https://www.suse.com/security/cve/CVE-2025-71269/ self
https://www.suse.com/security/cve/CVE-2026-22990/ self
https://www.suse.com/security/cve/CVE-2026-23103/ self
https://www.suse.com/security/cve/CVE-2026-23120/ self
https://www.suse.com/security/cve/CVE-2026-23243/ self
https://www.suse.com/security/cve/CVE-2026-23262/ self
https://www.suse.com/security/cve/CVE-2026-23272/ self
https://www.suse.com/security/cve/CVE-2026-23277/ self
https://www.suse.com/security/cve/CVE-2026-23318/ self
https://www.suse.com/security/cve/CVE-2026-23362/ self
https://www.suse.com/security/cve/CVE-2026-23382/ self
https://www.suse.com/security/cve/CVE-2026-23386/ self
https://www.suse.com/security/cve/CVE-2026-23398/ self
https://www.suse.com/security/cve/CVE-2024-26584 external
https://bugzilla.suse.com/1220186 external
https://www.suse.com/security/cve/CVE-2025-38234 external
https://bugzilla.suse.com/1246057 external
https://www.suse.com/security/cve/CVE-2025-39759 external
https://bugzilla.suse.com/1249522 external
https://www.suse.com/security/cve/CVE-2025-71268 external
https://bugzilla.suse.com/1259865 external
https://www.suse.com/security/cve/CVE-2025-71269 external
https://bugzilla.suse.com/1259889 external
https://www.suse.com/security/cve/CVE-2026-22990 external
https://bugzilla.suse.com/1257221 external
https://www.suse.com/security/cve/CVE-2026-23103 external
https://bugzilla.suse.com/1257773 external
https://www.suse.com/security/cve/CVE-2026-23120 external
https://bugzilla.suse.com/1258280 external
https://www.suse.com/security/cve/CVE-2026-23243 external
https://bugzilla.suse.com/1259797 external
https://bugzilla.suse.com/1259798 external
https://www.suse.com/security/cve/CVE-2026-23262 external
https://bugzilla.suse.com/1259870 external
https://www.suse.com/security/cve/CVE-2026-23272 external
https://bugzilla.suse.com/1260009 external
https://bugzilla.suse.com/1260909 external
https://www.suse.com/security/cve/CVE-2026-23277 external
https://bugzilla.suse.com/1259997 external
https://www.suse.com/security/cve/CVE-2026-23318 external
https://bugzilla.suse.com/1260536 external
https://www.suse.com/security/cve/CVE-2026-23362 external
https://bugzilla.suse.com/1260489 external
https://www.suse.com/security/cve/CVE-2026-23382 external
https://bugzilla.suse.com/1260551 external
https://www.suse.com/security/cve/CVE-2026-23386 external
https://bugzilla.suse.com/1260799 external
https://www.suse.com/security/cve/CVE-2026-23398 external
https://bugzilla.suse.com/1260730 external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2024-26584: net/tls: return ENOTSUPP on tls_init() (bsc#1220186).\n- CVE-2025-38234: sched/rt: Fix race in push_rt_task (bsc#1246057).\n- CVE-2025-39759: btrfs: qgroup: fix race between quota disable and quota rescan ioctl (bsc#1249522).\n- CVE-2025-71268: btrfs: fix reservation leak in some error paths when inserting inline extent (bsc#1259865).\n- CVE-2025-71269: btrfs: do not free data reservation in fallback from inline due to -ENOSPC (bsc#1259889).\n- CVE-2026-22990: libceph: replace overzealous BUG_ON in osdmap_apply_incremental() (bsc#1257221).\n- CVE-2026-23103: ipvlan: Make the addrs_lock be per port (bsc#1257773).\n- CVE-2026-23120: l2tp: avoid one data-race in l2tp_tunnel_del_work() (bsc#1258280).\n- CVE-2026-23243: RDMA/umad: Reject negative data_len in ib_umad_write (bsc#1259797).\n- CVE-2026-23262: gve: Fix stats report corruption on queue count change (bsc#1259870).\n- CVE-2026-23272: netfilter: nf_tables: unconditionally bump set-nelems before insertion (bsc#1260009).\n- CVE-2026-23277: net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit (bsc#1259997).\n- CVE-2026-23318: ALSA: usb-audio: Use correct version for UAC3 header validation (bsc#1260536).\n- CVE-2026-23362: can: bcm: fix locking for bcm_op runtime updates (bsc#1260489).\n- CVE-2026-23382: HID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them (bsc#1260551).\n- CVE-2026-23386: gve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL (bsc#1260799).\n- CVE-2026-23398: icmp: fix NULL pointer dereference in icmp_tag_validation() (bsc#1260730).\n\nThe following non security issues were fixed:\n\n- btrfs: fix processing of delayed data refs during backref walking (bsc#1228031).\n- fs: skip superblock shrink on frozen xfs filesystems (bsc#1259770).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2026-1668,SUSE-SLE-Live-Patching-12-SP5-2026-1668,SUSE-SLE-SERVER-12-SP5-LTSS-2026-1668,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-1668",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1668-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2026:1668-1",
        "url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261668-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2026:1668-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2026-May/046145.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220186",
        "url": "https://bugzilla.suse.com/1220186"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1228031",
        "url": "https://bugzilla.suse.com/1228031"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1246057",
        "url": "https://bugzilla.suse.com/1246057"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1249522",
        "url": "https://bugzilla.suse.com/1249522"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1257221",
        "url": "https://bugzilla.suse.com/1257221"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1257773",
        "url": "https://bugzilla.suse.com/1257773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1258280",
        "url": "https://bugzilla.suse.com/1258280"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1259770",
        "url": "https://bugzilla.suse.com/1259770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1259797",
        "url": "https://bugzilla.suse.com/1259797"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1259865",
        "url": "https://bugzilla.suse.com/1259865"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1259870",
        "url": "https://bugzilla.suse.com/1259870"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1259889",
        "url": "https://bugzilla.suse.com/1259889"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1259997",
        "url": "https://bugzilla.suse.com/1259997"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1260009",
        "url": "https://bugzilla.suse.com/1260009"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1260489",
        "url": "https://bugzilla.suse.com/1260489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1260536",
        "url": "https://bugzilla.suse.com/1260536"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1260551",
        "url": "https://bugzilla.suse.com/1260551"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1260730",
        "url": "https://bugzilla.suse.com/1260730"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1260799",
        "url": "https://bugzilla.suse.com/1260799"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26584 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26584/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38234 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38234/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-39759 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-39759/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-71268 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-71268/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-71269 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-71269/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-22990 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-22990/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-23103 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-23103/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-23120 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-23120/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-23243 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-23243/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-23262 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-23262/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-23272 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-23272/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-23277 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-23277/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-23318 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-23318/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-23362 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-23362/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-23382 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-23382/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-23386 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-23386/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2026-23398 page",
        "url": "https://www.suse.com/security/cve/CVE-2026-23398/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2026-05-01T08:37:51Z",
      "generator": {
        "date": "2026-05-01T08:37:51Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2026:1668-1",
      "initial_release_date": "2026-05-01T08:37:51Z",
      "revision_history": [
        {
          "date": "2026-05-01T08:37:51Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.299.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.299.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.299.1.aarch64",
                  "product_id": "dlm-kmp-default-4.12.14-122.299.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.299.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.299.1.aarch64",
                  "product_id": "gfs2-kmp-default-4.12.14-122.299.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.299.1.aarch64",
                "product": {
                  "name": "kernel-default-4.12.14-122.299.1.aarch64",
                  "product_id": "kernel-default-4.12.14-122.299.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.299.1.aarch64",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.299.1.aarch64",
                  "product_id": "kernel-default-base-4.12.14-122.299.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.299.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.299.1.aarch64",
                  "product_id": "kernel-default-devel-4.12.14-122.299.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.299.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.299.1.aarch64",
                  "product_id": "kernel-default-extra-4.12.14-122.299.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.299.1.aarch64",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.299.1.aarch64",
                  "product_id": "kernel-default-kgraft-4.12.14-122.299.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.299.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.299.1.aarch64",
                  "product_id": "kernel-obs-build-4.12.14-122.299.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.299.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.299.1.aarch64",
                  "product_id": "kernel-obs-qa-4.12.14-122.299.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.299.1.aarch64",
                "product": {
                  "name": "kernel-syms-4.12.14-122.299.1.aarch64",
                  "product_id": "kernel-syms-4.12.14-122.299.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.299.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.299.1.aarch64",
                  "product_id": "kernel-vanilla-4.12.14-122.299.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.299.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.299.1.aarch64",
                  "product_id": "kernel-vanilla-base-4.12.14-122.299.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.299.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.299.1.aarch64",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.299.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.299.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.299.1.aarch64",
                  "product_id": "kselftests-kmp-default-4.12.14-122.299.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.299.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.12.14-122.299.1.noarch",
                "product": {
                  "name": "kernel-devel-4.12.14-122.299.1.noarch",
                  "product_id": "kernel-devel-4.12.14-122.299.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.12.14-122.299.2.noarch",
                "product": {
                  "name": "kernel-docs-4.12.14-122.299.2.noarch",
                  "product_id": "kernel-docs-4.12.14-122.299.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-4.12.14-122.299.2.noarch",
                "product": {
                  "name": "kernel-docs-html-4.12.14-122.299.2.noarch",
                  "product_id": "kernel-docs-html-4.12.14-122.299.2.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.12.14-122.299.1.noarch",
                "product": {
                  "name": "kernel-macros-4.12.14-122.299.1.noarch",
                  "product_id": "kernel-macros-4.12.14-122.299.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.12.14-122.299.1.noarch",
                "product": {
                  "name": "kernel-source-4.12.14-122.299.1.noarch",
                  "product_id": "kernel-source-4.12.14-122.299.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-4.12.14-122.299.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-4.12.14-122.299.1.noarch",
                  "product_id": "kernel-source-vanilla-4.12.14-122.299.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.299.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.299.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.299.1.ppc64le",
                  "product_id": "dlm-kmp-default-4.12.14-122.299.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
                  "product_id": "gfs2-kmp-default-4.12.14-122.299.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.299.1.ppc64le",
                "product": {
                  "name": "kernel-default-4.12.14-122.299.1.ppc64le",
                  "product_id": "kernel-default-4.12.14-122.299.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.299.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.299.1.ppc64le",
                  "product_id": "kernel-default-base-4.12.14-122.299.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.299.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.299.1.ppc64le",
                  "product_id": "kernel-default-devel-4.12.14-122.299.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.299.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.299.1.ppc64le",
                  "product_id": "kernel-default-extra-4.12.14-122.299.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
                  "product_id": "kernel-default-kgraft-4.12.14-122.299.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.299.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.299.1.ppc64le",
                  "product_id": "kernel-obs-build-4.12.14-122.299.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.299.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.299.1.ppc64le",
                  "product_id": "kernel-obs-qa-4.12.14-122.299.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.299.1.ppc64le",
                "product": {
                  "name": "kernel-syms-4.12.14-122.299.1.ppc64le",
                  "product_id": "kernel-syms-4.12.14-122.299.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.299.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.299.1.ppc64le",
                  "product_id": "kernel-vanilla-4.12.14-122.299.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.299.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.299.1.ppc64le",
                  "product_id": "kernel-vanilla-base-4.12.14-122.299.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.299.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.299.1.ppc64le",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.299.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.299.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.299.1.ppc64le",
                  "product_id": "kselftests-kmp-default-4.12.14-122.299.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.299.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.299.1.s390x",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.299.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.299.1.s390x",
                  "product_id": "dlm-kmp-default-4.12.14-122.299.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.299.1.s390x",
                  "product_id": "gfs2-kmp-default-4.12.14-122.299.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "kernel-default-4.12.14-122.299.1.s390x",
                  "product_id": "kernel-default-4.12.14-122.299.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.299.1.s390x",
                  "product_id": "kernel-default-base-4.12.14-122.299.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.299.1.s390x",
                  "product_id": "kernel-default-devel-4.12.14-122.299.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.299.1.s390x",
                  "product_id": "kernel-default-extra-4.12.14-122.299.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.299.1.s390x",
                  "product_id": "kernel-default-kgraft-4.12.14-122.299.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.299.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "kernel-default-man-4.12.14-122.299.1.s390x",
                  "product_id": "kernel-default-man-4.12.14-122.299.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.299.1.s390x",
                  "product_id": "kernel-obs-build-4.12.14-122.299.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.299.1.s390x",
                  "product_id": "kernel-obs-qa-4.12.14-122.299.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "kernel-syms-4.12.14-122.299.1.s390x",
                  "product_id": "kernel-syms-4.12.14-122.299.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.299.1.s390x",
                  "product_id": "kernel-vanilla-4.12.14-122.299.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.299.1.s390x",
                  "product_id": "kernel-vanilla-base-4.12.14-122.299.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.299.1.s390x",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.299.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-4.12.14-122.299.1.s390x",
                  "product_id": "kernel-zfcpdump-4.12.14-122.299.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-man-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-man-4.12.14-122.299.1.s390x",
                  "product_id": "kernel-zfcpdump-man-4.12.14-122.299.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.299.1.s390x",
                  "product_id": "kselftests-kmp-default-4.12.14-122.299.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.299.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.299.1.s390x",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.299.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.299.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.299.1.x86_64",
                  "product_id": "dlm-kmp-default-4.12.14-122.299.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.299.1.x86_64",
                  "product_id": "gfs2-kmp-default-4.12.14-122.299.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "kernel-default-4.12.14-122.299.1.x86_64",
                  "product_id": "kernel-default-4.12.14-122.299.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.299.1.x86_64",
                  "product_id": "kernel-default-base-4.12.14-122.299.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.299.1.x86_64",
                  "product_id": "kernel-default-devel-4.12.14-122.299.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.299.1.x86_64",
                  "product_id": "kernel-default-extra-4.12.14-122.299.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.299.1.x86_64",
                  "product_id": "kernel-default-kgraft-4.12.14-122.299.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-4.12.14-122.299.1.x86_64",
                  "product_id": "kernel-kvmsmall-4.12.14-122.299.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-base-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-base-4.12.14-122.299.1.x86_64",
                  "product_id": "kernel-kvmsmall-base-4.12.14-122.299.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-4.12.14-122.299.1.x86_64",
                  "product_id": "kernel-kvmsmall-devel-4.12.14-122.299.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.299.1.x86_64",
                  "product_id": "kernel-obs-build-4.12.14-122.299.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.299.1.x86_64",
                  "product_id": "kernel-obs-qa-4.12.14-122.299.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "kernel-syms-4.12.14-122.299.1.x86_64",
                  "product_id": "kernel-syms-4.12.14-122.299.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.299.1.x86_64",
                  "product_id": "kernel-vanilla-4.12.14-122.299.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.299.1.x86_64",
                  "product_id": "kernel-vanilla-base-4.12.14-122.299.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.299.1.x86_64",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.299.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.299.1.x86_64",
                  "product_id": "kselftests-kmp-default-4.12.14-122.299.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.299.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.299.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.299.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.299.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.299.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.299.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.299.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.299.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.299.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.299.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.299.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.299.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.299.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.299.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.299.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.299.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.299.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.299.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.299.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.299.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.299.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.299.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.299.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.299.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.299.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.299.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.299.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-122.299.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.299.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-122.299.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.299.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x"
        },
        "product_reference": "kernel-default-4.12.14-122.299.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.299.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-122.299.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.299.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.299.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.299.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-122.299.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.299.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x"
        },
        "product_reference": "kernel-default-base-4.12.14-122.299.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.299.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.299.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.299.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.299.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.299.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.299.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.299.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.299.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.299.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.299.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-122.299.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-122.299.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-122.299.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-122.299.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-122.299.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-122.299.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-122.299.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-122.299.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.299.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-122.299.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.299.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-122.299.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.299.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x"
        },
        "product_reference": "kernel-syms-4.12.14-122.299.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.299.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-122.299.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.299.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.299.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.299.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.299.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.299.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.299.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.299.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.299.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.299.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.299.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.299.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-122.299.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.299.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.299.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.299.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.299.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-122.299.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-122.299.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-122.299.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-122.299.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-122.299.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-122.299.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.299.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-122.299.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.299.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-26584",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26584"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: tls: handle backlogging of crypto requests\n\nSince we\u0027re setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on our\nrequests to the crypto API, crypto_aead_{encrypt,decrypt} can return\n -EBUSY instead of -EINPROGRESS in valid situations. For example, when\nthe cryptd queue for AESNI is full (easy to trigger with an\nartificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueued\nto the backlog but still processed. In that case, the async callback\nwill also be called twice: first with err == -EINPROGRESS, which it\nseems we can just ignore, then with err == 0.\n\nCompared to Sabrina\u0027s original patch this version uses the new\ntls_*crypt_async_wait() helpers and converts the EBUSY to\nEINPROGRESS to avoid having to modify all the error handling\npaths. The handling is identical.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26584",
          "url": "https://www.suse.com/security/cve/CVE-2024-26584"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220186 for CVE-2024-26584",
          "url": "https://bugzilla.suse.com/1220186"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-05-01T08:37:51Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-26584"
    },
    {
      "cve": "CVE-2025-38234",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-38234"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/rt: Fix race in push_rt_task\n\nOverview\n========\nWhen a CPU chooses to call push_rt_task and picks a task to push to\nanother CPU\u0027s runqueue then it will call find_lock_lowest_rq method\nwhich would take a double lock on both CPUs\u0027 runqueues. If one of the\nlocks aren\u0027t readily available, it may lead to dropping the current\nrunqueue lock and reacquiring both the locks at once. During this window\nit is possible that the task is already migrated and is running on some\nother CPU. These cases are already handled. However, if the task is\nmigrated and has already been executed and another CPU is now trying to\nwake it up (ttwu) such that it is queued again on the runqeue\n(on_rq is 1) and also if the task was run by the same CPU, then the\ncurrent checks will pass even though the task was migrated out and is no\nlonger in the pushable tasks list.\n\nCrashes\n=======\nThis bug resulted in quite a few flavors of crashes triggering kernel\npanics with various crash signatures such as assert failures, page\nfaults, null pointer dereferences, and queue corruption errors all\ncoming from scheduler itself.\n\nSome of the crashes:\n-\u003e kernel BUG at kernel/sched/rt.c:1616! BUG_ON(idx \u003e= MAX_RT_PRIO)\n   Call Trace:\n   ? __die_body+0x1a/0x60\n   ? die+0x2a/0x50\n   ? do_trap+0x85/0x100\n   ? pick_next_task_rt+0x6e/0x1d0\n   ? do_error_trap+0x64/0xa0\n   ? pick_next_task_rt+0x6e/0x1d0\n   ? exc_invalid_op+0x4c/0x60\n   ? pick_next_task_rt+0x6e/0x1d0\n   ? asm_exc_invalid_op+0x12/0x20\n   ? pick_next_task_rt+0x6e/0x1d0\n   __schedule+0x5cb/0x790\n   ? update_ts_time_stats+0x55/0x70\n   schedule_idle+0x1e/0x40\n   do_idle+0x15e/0x200\n   cpu_startup_entry+0x19/0x20\n   start_secondary+0x117/0x160\n   secondary_startup_64_no_verify+0xb0/0xbb\n\n-\u003e BUG: kernel NULL pointer dereference, address: 00000000000000c0\n   Call Trace:\n   ? __die_body+0x1a/0x60\n   ? no_context+0x183/0x350\n   ? __warn+0x8a/0xe0\n   ? exc_page_fault+0x3d6/0x520\n   ? asm_exc_page_fault+0x1e/0x30\n   ? pick_next_task_rt+0xb5/0x1d0\n   ? pick_next_task_rt+0x8c/0x1d0\n   __schedule+0x583/0x7e0\n   ? update_ts_time_stats+0x55/0x70\n   schedule_idle+0x1e/0x40\n   do_idle+0x15e/0x200\n   cpu_startup_entry+0x19/0x20\n   start_secondary+0x117/0x160\n   secondary_startup_64_no_verify+0xb0/0xbb\n\n-\u003e BUG: unable to handle page fault for address: ffff9464daea5900\n   kernel BUG at kernel/sched/rt.c:1861! BUG_ON(rq-\u003ecpu != task_cpu(p))\n\n-\u003e kernel BUG at kernel/sched/rt.c:1055! BUG_ON(!rq-\u003enr_running)\n   Call Trace:\n   ? __die_body+0x1a/0x60\n   ? die+0x2a/0x50\n   ? do_trap+0x85/0x100\n   ? dequeue_top_rt_rq+0xa2/0xb0\n   ? do_error_trap+0x64/0xa0\n   ? dequeue_top_rt_rq+0xa2/0xb0\n   ? exc_invalid_op+0x4c/0x60\n   ? dequeue_top_rt_rq+0xa2/0xb0\n   ? asm_exc_invalid_op+0x12/0x20\n   ? dequeue_top_rt_rq+0xa2/0xb0\n   dequeue_rt_entity+0x1f/0x70\n   dequeue_task_rt+0x2d/0x70\n   __schedule+0x1a8/0x7e0\n   ? blk_finish_plug+0x25/0x40\n   schedule+0x3c/0xb0\n   futex_wait_queue_me+0xb6/0x120\n   futex_wait+0xd9/0x240\n   do_futex+0x344/0xa90\n   ? get_mm_exe_file+0x30/0x60\n   ? audit_exe_compare+0x58/0x70\n   ? audit_filter_rules.constprop.26+0x65e/0x1220\n   __x64_sys_futex+0x148/0x1f0\n   do_syscall_64+0x30/0x80\n   entry_SYSCALL_64_after_hwframe+0x62/0xc7\n\n-\u003e BUG: unable to handle page fault for address: ffff8cf3608bc2c0\n   Call Trace:\n   ? __die_body+0x1a/0x60\n   ? no_context+0x183/0x350\n   ? spurious_kernel_fault+0x171/0x1c0\n   ? exc_page_fault+0x3b6/0x520\n   ? plist_check_list+0x15/0x40\n   ? plist_check_list+0x2e/0x40\n   ? asm_exc_page_fault+0x1e/0x30\n   ? _cond_resched+0x15/0x30\n   ? futex_wait_queue_me+0xc8/0x120\n   ? futex_wait+0xd9/0x240\n   ? try_to_wake_up+0x1b8/0x490\n   ? futex_wake+0x78/0x160\n   ? do_futex+0xcd/0xa90\n   ? plist_check_list+0x15/0x40\n   ? plist_check_list+0x2e/0x40\n   ? plist_del+0x6a/0xd0\n   ? plist_check_list+0x15/0x40\n   ? plist_check_list+0x2e/0x40\n   ? dequeue_pushable_task+0x20/0x70\n   ? __schedule+0x382/0x7e0\n   ? asm_sysvec_reschedule_i\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-38234",
          "url": "https://www.suse.com/security/cve/CVE-2025-38234"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1246057 for CVE-2025-38234",
          "url": "https://bugzilla.suse.com/1246057"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-05-01T08:37:51Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-38234"
    },
    {
      "cve": "CVE-2025-39759",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-39759"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: qgroup: fix race between quota disable and quota rescan ioctl\n\nThere\u0027s a race between a task disabling quotas and another running the\nrescan ioctl that can result in a use-after-free of qgroup records from\nthe fs_info-\u003eqgroup_tree rbtree.\n\nThis happens as follows:\n\n1) Task A enters btrfs_ioctl_quota_rescan() -\u003e btrfs_qgroup_rescan();\n\n2) Task B enters btrfs_quota_disable() and calls\n   btrfs_qgroup_wait_for_completion(), which does nothing because at that\n   point fs_info-\u003eqgroup_rescan_running is false (it wasn\u0027t set yet by\n   task A);\n\n3) Task B calls btrfs_free_qgroup_config() which starts freeing qgroups\n   from fs_info-\u003eqgroup_tree without taking the lock fs_info-\u003eqgroup_lock;\n\n4) Task A enters qgroup_rescan_zero_tracking() which starts iterating\n   the fs_info-\u003eqgroup_tree tree while holding fs_info-\u003eqgroup_lock,\n   but task B is freeing qgroup records from that tree without holding\n   the lock, resulting in a use-after-free.\n\nFix this by taking fs_info-\u003eqgroup_lock at btrfs_free_qgroup_config().\nAlso at btrfs_qgroup_rescan() don\u0027t start the rescan worker if quotas\nwere already disabled.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-39759",
          "url": "https://www.suse.com/security/cve/CVE-2025-39759"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1249522 for CVE-2025-39759",
          "url": "https://bugzilla.suse.com/1249522"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-05-01T08:37:51Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-39759"
    },
    {
      "cve": "CVE-2025-71268",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-71268"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix reservation leak in some error paths when inserting inline extent\n\nIf we fail to allocate a path or join a transaction, we return from\n__cow_file_range_inline() without freeing the reserved qgroup data,\nresulting in a leak. Fix this by ensuring we call btrfs_qgroup_free_data()\nin such cases.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-71268",
          "url": "https://www.suse.com/security/cve/CVE-2025-71268"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1259865 for CVE-2025-71268",
          "url": "https://bugzilla.suse.com/1259865"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-05-01T08:37:51Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-71268"
    },
    {
      "cve": "CVE-2025-71269",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-71269"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not free data reservation in fallback from inline due to -ENOSPC\n\nIf we fail to create an inline extent due to -ENOSPC, we will attempt to\ngo through the normal COW path, reserve an extent, create an ordered\nextent, etc. However we were always freeing the reserved qgroup data,\nwhich is wrong since we will use data. Fix this by freeing the reserved\nqgroup data in __cow_file_range_inline() only if we are not doing the\nfallback (ret is \u003c= 0).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-71269",
          "url": "https://www.suse.com/security/cve/CVE-2025-71269"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1259889 for CVE-2025-71269",
          "url": "https://bugzilla.suse.com/1259889"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-05-01T08:37:51Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-71269"
    },
    {
      "cve": "CVE-2026-22990",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-22990"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlibceph: replace overzealous BUG_ON in osdmap_apply_incremental()\n\nIf the osdmap is (maliciously) corrupted such that the incremental\nosdmap epoch is different from what is expected, there is no need to\nBUG.  Instead, just declare the incremental osdmap to be invalid.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-22990",
          "url": "https://www.suse.com/security/cve/CVE-2026-22990"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1257221 for CVE-2026-22990",
          "url": "https://bugzilla.suse.com/1257221"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-05-01T08:37:51Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-22990"
    },
    {
      "cve": "CVE-2026-23103",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-23103"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: Make the addrs_lock be per port\n\nMake the addrs_lock be per port, not per ipvlan dev.\n\nInitial code seems to be written in the assumption,\nthat any address change must occur under RTNL.\nBut it is not so for the case of IPv6. So\n\n1) Introduce per-port addrs_lock.\n\n2) It was needed to fix places where it was forgotten\nto take lock (ipvlan_open/ipvlan_close)\n\nThis appears to be a very minor problem though.\nSince it\u0027s highly unlikely that ipvlan_add_addr() will\nbe called on 2 CPU simultaneously. But nevertheless,\nthis could cause:\n\n1) False-negative of ipvlan_addr_busy(): one interface\niterated through all port-\u003eipvlans + ipvlan-\u003eaddrs\nunder some ipvlan spinlock, and another added IP\nunder its own lock. Though this is only possible\nfor IPv6, since looks like only ipvlan_addr6_event() can be\ncalled without rtnl_lock.\n\n2) Race since ipvlan_ht_addr_add(port) is called under\ndifferent ipvlan-\u003eaddrs_lock locks\n\nThis should not affect performance, since add/remove IP\nis a rare situation and spinlock is not taken on fast\npaths.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-23103",
          "url": "https://www.suse.com/security/cve/CVE-2026-23103"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1257773 for CVE-2026-23103",
          "url": "https://bugzilla.suse.com/1257773"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-05-01T08:37:51Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-23103"
    },
    {
      "cve": "CVE-2026-23120",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-23120"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nl2tp: avoid one data-race in l2tp_tunnel_del_work()\n\nWe should read sk-\u003esk_socket only when dealing with kernel sockets.\n\nsyzbot reported the following data-race:\n\nBUG: KCSAN: data-race in l2tp_tunnel_del_work / sk_common_release\n\nwrite to 0xffff88811c182b20 of 8 bytes by task 5365 on cpu 0:\n  sk_set_socket include/net/sock.h:2092 [inline]\n  sock_orphan include/net/sock.h:2118 [inline]\n  sk_common_release+0xae/0x230 net/core/sock.c:4003\n  udp_lib_close+0x15/0x20 include/net/udp.h:325\n  inet_release+0xce/0xf0 net/ipv4/af_inet.c:437\n  __sock_release net/socket.c:662 [inline]\n  sock_close+0x6b/0x150 net/socket.c:1455\n  __fput+0x29b/0x650 fs/file_table.c:468\n  ____fput+0x1c/0x30 fs/file_table.c:496\n  task_work_run+0x131/0x1a0 kernel/task_work.c:233\n  resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]\n  __exit_to_user_mode_loop kernel/entry/common.c:44 [inline]\n  exit_to_user_mode_loop+0x1fe/0x740 kernel/entry/common.c:75\n  __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline]\n  syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline]\n  syscall_exit_to_user_mode_work include/linux/entry-common.h:159 [inline]\n  syscall_exit_to_user_mode include/linux/entry-common.h:194 [inline]\n  do_syscall_64+0x1e1/0x2b0 arch/x86/entry/syscall_64.c:100\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n\nread to 0xffff88811c182b20 of 8 bytes by task 827 on cpu 1:\n  l2tp_tunnel_del_work+0x2f/0x1a0 net/l2tp/l2tp_core.c:1418\n  process_one_work kernel/workqueue.c:3257 [inline]\n  process_scheduled_works+0x4ce/0x9d0 kernel/workqueue.c:3340\n  worker_thread+0x582/0x770 kernel/workqueue.c:3421\n  kthread+0x489/0x510 kernel/kthread.c:463\n  ret_from_fork+0x149/0x290 arch/x86/kernel/process.c:158\n  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246\n\nvalue changed: 0xffff88811b818000 -\u003e 0x0000000000000000",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-23120",
          "url": "https://www.suse.com/security/cve/CVE-2026-23120"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1258280 for CVE-2026-23120",
          "url": "https://bugzilla.suse.com/1258280"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-05-01T08:37:51Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-23120"
    },
    {
      "cve": "CVE-2026-23243",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-23243"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/umad: Reject negative data_len in ib_umad_write\n\nib_umad_write computes data_len from user-controlled count and the\nMAD header sizes. With a mismatched user MAD header size and RMPP\nheader length, data_len can become negative and reach ib_create_send_mad().\nThis can make the padding calculation exceed the segment size and trigger\nan out-of-bounds memset in alloc_send_rmpp_list().\n\nAdd an explicit check to reject negative data_len before creating the\nsend buffer.\n\nKASAN splat:\n[  211.363464] BUG: KASAN: slab-out-of-bounds in ib_create_send_mad+0xa01/0x11b0\n[  211.364077] Write of size 220 at addr ffff88800c3fa1f8 by task spray_thread/102\n[  211.365867] ib_create_send_mad+0xa01/0x11b0\n[  211.365887] ib_umad_write+0x853/0x1c80",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-23243",
          "url": "https://www.suse.com/security/cve/CVE-2026-23243"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1259797 for CVE-2026-23243",
          "url": "https://bugzilla.suse.com/1259797"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1259798 for CVE-2026-23243",
          "url": "https://bugzilla.suse.com/1259798"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-05-01T08:37:51Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-23243"
    },
    {
      "cve": "CVE-2026-23262",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-23262"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngve: Fix stats report corruption on queue count change\n\nThe driver and the NIC share a region in memory for stats reporting.\nThe NIC calculates its offset into this region based on the total size\nof the stats region and the size of the NIC\u0027s stats.\n\nWhen the number of queues is changed, the driver\u0027s stats region is\nresized. If the queue count is increased, the NIC can write past\nthe end of the allocated stats region, causing memory corruption.\nIf the queue count is decreased, there is a gap between the driver\nand NIC stats, leading to incorrect stats reporting.\n\nThis change fixes the issue by allocating stats region with maximum\nsize, and the offset calculation for NIC stats is changed to match\nwith the calculation of the NIC.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-23262",
          "url": "https://www.suse.com/security/cve/CVE-2026-23262"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1259870 for CVE-2026-23262",
          "url": "https://bugzilla.suse.com/1259870"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-05-01T08:37:51Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-23262"
    },
    {
      "cve": "CVE-2026-23272",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-23272"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: unconditionally bump set-\u003enelems before insertion\n\nIn case that the set is full, a new element gets published then removed\nwithout waiting for the RCU grace period, while RCU reader can be\nwalking over it already.\n\nTo address this issue, add the element transaction even if set is full,\nbut toggle the set_full flag to report -ENFILE so the abort path safely\nunwinds the set to its previous state.\n\nAs for element updates, decrement set-\u003enelems to restore it.\n\nA simpler fix is to call synchronize_rcu() in the error path.\nHowever, with a large batch adding elements to already maxed-out set,\nthis could cause noticeable slowdown of such batches.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-23272",
          "url": "https://www.suse.com/security/cve/CVE-2026-23272"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1260009 for CVE-2026-23272",
          "url": "https://bugzilla.suse.com/1260009"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1260909 for CVE-2026-23272",
          "url": "https://bugzilla.suse.com/1260909"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-05-01T08:37:51Z",
          "details": "important"
        }
      ],
      "title": "CVE-2026-23272"
    },
    {
      "cve": "CVE-2026-23277",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-23277"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit\n\nteql_master_xmit() calls netdev_start_xmit(skb, slave) to transmit\nthrough slave devices, but does not update skb-\u003edev to the slave device\nbeforehand.\n\nWhen a gretap tunnel is a TEQL slave, the transmit path reaches\niptunnel_xmit() which saves dev = skb-\u003edev (still pointing to teql0\nmaster) and later calls iptunnel_xmit_stats(dev, pkt_len). This\nfunction does:\n\n    get_cpu_ptr(dev-\u003etstats)\n\nSince teql_master_setup() does not set dev-\u003epcpu_stat_type to\nNETDEV_PCPU_STAT_TSTATS, the core network stack never allocates tstats\nfor teql0, so dev-\u003etstats is NULL. get_cpu_ptr(NULL) computes\nNULL + __per_cpu_offset[cpu], resulting in a page fault.\n\n BUG: unable to handle page fault for address: ffff8880e6659018\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n PGD 68bc067 P4D 68bc067 PUD 0\n Oops: Oops: 0002 [#1] SMP KASAN PTI\n RIP: 0010:iptunnel_xmit (./include/net/ip_tunnels.h:664 net/ipv4/ip_tunnel_core.c:89)\n Call Trace:\n  \u003cTASK\u003e\n  ip_tunnel_xmit (net/ipv4/ip_tunnel.c:847)\n  __gre_xmit (net/ipv4/ip_gre.c:478)\n  gre_tap_xmit (net/ipv4/ip_gre.c:779)\n  teql_master_xmit (net/sched/sch_teql.c:319)\n  dev_hard_start_xmit (net/core/dev.c:3887)\n  sch_direct_xmit (net/sched/sch_generic.c:347)\n  __dev_queue_xmit (net/core/dev.c:4802)\n  neigh_direct_output (net/core/neighbour.c:1660)\n  ip_finish_output2 (net/ipv4/ip_output.c:237)\n  __ip_finish_output.part.0 (net/ipv4/ip_output.c:315)\n  ip_mc_output (net/ipv4/ip_output.c:369)\n  ip_send_skb (net/ipv4/ip_output.c:1508)\n  udp_send_skb (net/ipv4/udp.c:1195)\n  udp_sendmsg (net/ipv4/udp.c:1485)\n  inet_sendmsg (net/ipv4/af_inet.c:859)\n  __sys_sendto (net/socket.c:2206)\n\nFix this by setting skb-\u003edev = slave before calling\nnetdev_start_xmit(), so that tunnel xmit functions see the correct\nslave device with properly allocated tstats.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-23277",
          "url": "https://www.suse.com/security/cve/CVE-2026-23277"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1259997 for CVE-2026-23277",
          "url": "https://bugzilla.suse.com/1259997"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-05-01T08:37:51Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-23277"
    },
    {
      "cve": "CVE-2026-23318",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-23318"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Use correct version for UAC3 header validation\n\nThe entry of the validators table for UAC3 AC header descriptor is\ndefined with the wrong protocol version UAC_VERSION_2, while it should\nhave been UAC_VERSION_3.  This results in the validator never matching\nfor actual UAC3 devices (protocol == UAC_VERSION_3), causing their\nheader descriptors to bypass validation entirely.  A malicious USB\ndevice presenting a truncated UAC3 header could exploit this to cause\nout-of-bounds reads when the driver later accesses unvalidated\ndescriptor fields.\n\nThe bug was introduced in the same commit as the recently fixed UAC3\nfeature unit sub-type typo, and appears to be from the same copy-paste\nerror when the UAC3 section was created from the UAC2 section.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-23318",
          "url": "https://www.suse.com/security/cve/CVE-2026-23318"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1260536 for CVE-2026-23318",
          "url": "https://bugzilla.suse.com/1260536"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-05-01T08:37:51Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-23318"
    },
    {
      "cve": "CVE-2026-23362",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-23362"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: bcm: fix locking for bcm_op runtime updates\n\nCommit c2aba69d0c36 (\"can: bcm: add locking for bcm_op runtime updates\")\nadded a locking for some variables that can be modified at runtime when\nupdating the sending bcm_op with a new TX_SETUP command in bcm_tx_setup().\n\nUsually the RX_SETUP only handles and filters incoming traffic with one\nexception: When the RX_RTR_FRAME flag is set a predefined CAN frame is\nsent when a specific RTR frame is received. Therefore the rx bcm_op uses\nbcm_can_tx() which uses the bcm_tx_lock that was only initialized in\nbcm_tx_setup(). Add the missing spin_lock_init() when allocating the\nbcm_op in bcm_rx_setup() to handle the RTR case properly.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-23362",
          "url": "https://www.suse.com/security/cve/CVE-2026-23362"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1260489 for CVE-2026-23362",
          "url": "https://bugzilla.suse.com/1260489"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-05-01T08:37:51Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-23362"
    },
    {
      "cve": "CVE-2026-23382",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-23382"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: Add HID_CLAIMED_INPUT guards in raw_event callbacks missing them\n\nIn commit 2ff5baa9b527 (\"HID: appleir: Fix potential NULL dereference at\nraw event handle\"), we handle the fact that raw event callbacks\ncan happen even for a HID device that has not been \"claimed\" causing a\ncrash if a broken device were attempted to be connected to the system.\n\nFix up the remaining in-tree HID drivers that forgot to add this same\ncheck to resolve the same issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-23382",
          "url": "https://www.suse.com/security/cve/CVE-2026-23382"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1260551 for CVE-2026-23382",
          "url": "https://bugzilla.suse.com/1260551"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-05-01T08:37:51Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-23382"
    },
    {
      "cve": "CVE-2026-23386",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-23386"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL\n\nIn DQ-QPL mode, gve_tx_clean_pending_packets() incorrectly uses the RDA\nbuffer cleanup path. It iterates num_bufs times and attempts to unmap\nentries in the dma array.\n\nThis leads to two issues:\n1. The dma array shares storage with tx_qpl_buf_ids (union).\n Interpreting buffer IDs as DMA addresses results in attempting to\n unmap incorrect memory locations.\n2. num_bufs in QPL mode (counting 2K chunks) can significantly exceed\n the size of the dma array, causing out-of-bounds access warnings\n(trace below is how we noticed this issue).\n\nUBSAN: array-index-out-of-bounds in\ndrivers/net/ethernet/drivers/net/ethernet/google/gve/gve_tx_dqo.c:178:5 index 18 is out of\nrange for type \u0027dma_addr_t[18]\u0027 (aka \u0027unsigned long long[18]\u0027)\nWorkqueue: gve gve_service_task [gve]\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl+0x33/0xa0\n__ubsan_handle_out_of_bounds+0xdc/0x110\ngve_tx_stop_ring_dqo+0x182/0x200 [gve]\ngve_close+0x1be/0x450 [gve]\ngve_reset+0x99/0x120 [gve]\ngve_service_task+0x61/0x100 [gve]\nprocess_scheduled_works+0x1e9/0x380\n\nFix this by properly checking for QPL mode and delegating to\ngve_free_tx_qpl_bufs() to reclaim the buffers.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-23386",
          "url": "https://www.suse.com/security/cve/CVE-2026-23386"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1260799 for CVE-2026-23386",
          "url": "https://bugzilla.suse.com/1260799"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-05-01T08:37:51Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-23386"
    },
    {
      "cve": "CVE-2026-23398",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2026-23398"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nicmp: fix NULL pointer dereference in icmp_tag_validation()\n\nicmp_tag_validation() unconditionally dereferences the result of\nrcu_dereference(inet_protos[proto]) without checking for NULL.\nThe inet_protos[] array is sparse -- only about 15 of 256 protocol\nnumbers have registered handlers. When ip_no_pmtu_disc is set to 3\n(hardened PMTU mode) and the kernel receives an ICMP Fragmentation\nNeeded error with a quoted inner IP header containing an unregistered\nprotocol number, the NULL dereference causes a kernel panic in\nsoftirq context.\n\n Oops: general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] SMP KASAN NOPTI\n KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]\n RIP: 0010:icmp_unreach (net/ipv4/icmp.c:1085 net/ipv4/icmp.c:1143)\n Call Trace:\n  \u003cIRQ\u003e\n  icmp_rcv (net/ipv4/icmp.c:1527)\n  ip_protocol_deliver_rcu (net/ipv4/ip_input.c:207)\n  ip_local_deliver_finish (net/ipv4/ip_input.c:242)\n  ip_local_deliver (net/ipv4/ip_input.c:262)\n  ip_rcv (net/ipv4/ip_input.c:573)\n  __netif_receive_skb_one_core (net/core/dev.c:6164)\n  process_backlog (net/core/dev.c:6628)\n  handle_softirqs (kernel/softirq.c:561)\n  \u003c/IRQ\u003e\n\nAdd a NULL check before accessing icmp_strict_tag_validation. If the\nprotocol has no registered handler, return false since it cannot\nperform strict tag validation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2026-23398",
          "url": "https://www.suse.com/security/cve/CVE-2026-23398"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1260730 for CVE-2026-23398",
          "url": "https://bugzilla.suse.com/1260730"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_299-default-1-8.3.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.299.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.299.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.299.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-05-01T08:37:51Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2026-23398"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…