opensuse-su-2024:13767-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-devel-6.7.9-1.1 on GA media

Notes

Title of the patch
kernel-devel-6.7.9-1.1 on GA media
Description of the patch
These are all security issues fixed in the kernel-devel-6.7.9-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-13767
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "kernel-devel-6.7.9-1.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the kernel-devel-6.7.9-1.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2024-13767",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13767-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52456 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52456/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52457 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52457/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52459 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52459/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52461 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52461/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-26605 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-26605/"
      }
    ],
    "title": "kernel-devel-6.7.9-1.1 on GA media",
    "tracking": {
      "current_release_date": "2024-06-15T00:00:00Z",
      "generator": {
        "date": "2024-06-15T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:13767-1",
      "initial_release_date": "2024-06-15T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-06-15T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-6.7.9-1.1.aarch64",
                "product": {
                  "name": "kernel-devel-6.7.9-1.1.aarch64",
                  "product_id": "kernel-devel-6.7.9-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-6.7.9-1.1.aarch64",
                "product": {
                  "name": "kernel-macros-6.7.9-1.1.aarch64",
                  "product_id": "kernel-macros-6.7.9-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-6.7.9-1.1.aarch64",
                "product": {
                  "name": "kernel-source-6.7.9-1.1.aarch64",
                  "product_id": "kernel-source-6.7.9-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-6.7.9-1.1.aarch64",
                "product": {
                  "name": "kernel-source-vanilla-6.7.9-1.1.aarch64",
                  "product_id": "kernel-source-vanilla-6.7.9-1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-6.7.9-1.1.ppc64le",
                "product": {
                  "name": "kernel-devel-6.7.9-1.1.ppc64le",
                  "product_id": "kernel-devel-6.7.9-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-6.7.9-1.1.ppc64le",
                "product": {
                  "name": "kernel-macros-6.7.9-1.1.ppc64le",
                  "product_id": "kernel-macros-6.7.9-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-6.7.9-1.1.ppc64le",
                "product": {
                  "name": "kernel-source-6.7.9-1.1.ppc64le",
                  "product_id": "kernel-source-6.7.9-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-6.7.9-1.1.ppc64le",
                "product": {
                  "name": "kernel-source-vanilla-6.7.9-1.1.ppc64le",
                  "product_id": "kernel-source-vanilla-6.7.9-1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-6.7.9-1.1.s390x",
                "product": {
                  "name": "kernel-devel-6.7.9-1.1.s390x",
                  "product_id": "kernel-devel-6.7.9-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-6.7.9-1.1.s390x",
                "product": {
                  "name": "kernel-macros-6.7.9-1.1.s390x",
                  "product_id": "kernel-macros-6.7.9-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-6.7.9-1.1.s390x",
                "product": {
                  "name": "kernel-source-6.7.9-1.1.s390x",
                  "product_id": "kernel-source-6.7.9-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-6.7.9-1.1.s390x",
                "product": {
                  "name": "kernel-source-vanilla-6.7.9-1.1.s390x",
                  "product_id": "kernel-source-vanilla-6.7.9-1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-6.7.9-1.1.x86_64",
                "product": {
                  "name": "kernel-devel-6.7.9-1.1.x86_64",
                  "product_id": "kernel-devel-6.7.9-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-6.7.9-1.1.x86_64",
                "product": {
                  "name": "kernel-macros-6.7.9-1.1.x86_64",
                  "product_id": "kernel-macros-6.7.9-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-6.7.9-1.1.x86_64",
                "product": {
                  "name": "kernel-source-6.7.9-1.1.x86_64",
                  "product_id": "kernel-source-6.7.9-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-6.7.9-1.1.x86_64",
                "product": {
                  "name": "kernel-source-vanilla-6.7.9-1.1.x86_64",
                  "product_id": "kernel-source-vanilla-6.7.9-1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-6.7.9-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.aarch64"
        },
        "product_reference": "kernel-devel-6.7.9-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-6.7.9-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.ppc64le"
        },
        "product_reference": "kernel-devel-6.7.9-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-6.7.9-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.s390x"
        },
        "product_reference": "kernel-devel-6.7.9-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-6.7.9-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.x86_64"
        },
        "product_reference": "kernel-devel-6.7.9-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-6.7.9-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.aarch64"
        },
        "product_reference": "kernel-macros-6.7.9-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-6.7.9-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.ppc64le"
        },
        "product_reference": "kernel-macros-6.7.9-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-6.7.9-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.s390x"
        },
        "product_reference": "kernel-macros-6.7.9-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-6.7.9-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.x86_64"
        },
        "product_reference": "kernel-macros-6.7.9-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-6.7.9-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.aarch64"
        },
        "product_reference": "kernel-source-6.7.9-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-6.7.9-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.ppc64le"
        },
        "product_reference": "kernel-source-6.7.9-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-6.7.9-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.s390x"
        },
        "product_reference": "kernel-source-6.7.9-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-6.7.9-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.x86_64"
        },
        "product_reference": "kernel-source-6.7.9-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-vanilla-6.7.9-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.aarch64"
        },
        "product_reference": "kernel-source-vanilla-6.7.9-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-vanilla-6.7.9-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.ppc64le"
        },
        "product_reference": "kernel-source-vanilla-6.7.9-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-vanilla-6.7.9-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.s390x"
        },
        "product_reference": "kernel-source-vanilla-6.7.9-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-vanilla-6.7.9-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.x86_64"
        },
        "product_reference": "kernel-source-vanilla-6.7.9-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-52456",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52456"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: imx: fix tx statemachine deadlock\n\nWhen using the serial port as RS485 port, the tx statemachine is used to\ncontrol the RTS pin to drive the RS485 transceiver TX_EN pin. When the\nTTY port is closed in the middle of a transmission (for instance during\nuserland application crash), imx_uart_shutdown disables the interface\nand disables the Transmission Complete interrupt. afer that,\nimx_uart_stop_tx bails on an incomplete transmission, to be retriggered\nby the TC interrupt. This interrupt is disabled and therefore the tx\nstatemachine never transitions out of SEND. The statemachine is in\ndeadlock now, and the TX_EN remains low, making the interface useless.\n\nimx_uart_stop_tx now checks for incomplete transmission AND whether TC\ninterrupts are enabled before bailing to be retriggered. This makes sure\nthe state machine handling is reached, and is properly set to\nWAIT_AFTER_SEND.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52456",
          "url": "https://www.suse.com/security/cve/CVE-2023-52456"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220364 for CVE-2023-52456",
          "url": "https://bugzilla.suse.com/1220364"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52456"
    },
    {
      "cve": "CVE-2023-52457",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52457"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nserial: 8250: omap: Don\u0027t skip resource freeing if pm_runtime_resume_and_get() failed\n\nReturning an error code from .remove() makes the driver core emit the\nlittle helpful error message:\n\n\tremove callback returned a non-zero value. This will be ignored.\n\nand then remove the device anyhow. So all resources that were not freed\nare leaked in this case. Skipping serial8250_unregister_port() has the\npotential to keep enough of the UART around to trigger a use-after-free.\n\nSo replace the error return (and with it the little helpful error\nmessage) by a more useful error message and continue to cleanup.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52457",
          "url": "https://www.suse.com/security/cve/CVE-2023-52457"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220350 for CVE-2023-52457",
          "url": "https://bugzilla.suse.com/1220350"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52457"
    },
    {
      "cve": "CVE-2023-52459",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52459"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: v4l: async: Fix duplicated list deletion\n\nThe list deletion call dropped here is already called from the\nhelper function in the line before. Having a second list_del()\ncall results in either a warning (with CONFIG_DEBUG_LIST=y):\n\nlist_del corruption, c46c8198-\u003enext is LIST_POISON1 (00000100)\n\nIf CONFIG_DEBUG_LIST is disabled the operation results in a\nkernel error due to NULL pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52459",
          "url": "https://www.suse.com/security/cve/CVE-2023-52459"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220318 for CVE-2023-52459",
          "url": "https://bugzilla.suse.com/1220318"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52459"
    },
    {
      "cve": "CVE-2023-52461",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52461"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sched: Fix bounds limiting when given a malformed entity\n\nIf we\u0027re given a malformed entity in drm_sched_entity_init()--shouldn\u0027t\nhappen, but we verify--with out-of-bounds priority value, we set it to an\nallowed value. Fix the expression which sets this limit.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52461",
          "url": "https://www.suse.com/security/cve/CVE-2023-52461"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220322 for CVE-2023-52461",
          "url": "https://bugzilla.suse.com/1220322"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52461"
    },
    {
      "cve": "CVE-2024-26605",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-26605"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI/ASPM: Fix deadlock when enabling ASPM\n\nA last minute revert in 6.7-final introduced a potential deadlock when\nenabling ASPM during probe of Qualcomm PCIe controllers as reported by\nlockdep:\n\n  ============================================\n  WARNING: possible recursive locking detected\n  6.7.0 #40 Not tainted\n  --------------------------------------------\n  kworker/u16:5/90 is trying to acquire lock:\n  ffffacfa78ced000 (pci_bus_sem){++++}-{3:3}, at: pcie_aspm_pm_state_change+0x58/0xdc\n\n              but task is already holding lock:\n  ffffacfa78ced000 (pci_bus_sem){++++}-{3:3}, at: pci_walk_bus+0x34/0xbc\n\n              other info that might help us debug this:\n   Possible unsafe locking scenario:\n\n         CPU0\n         ----\n    lock(pci_bus_sem);\n    lock(pci_bus_sem);\n\n               *** DEADLOCK ***\n\n  Call trace:\n   print_deadlock_bug+0x25c/0x348\n   __lock_acquire+0x10a4/0x2064\n   lock_acquire+0x1e8/0x318\n   down_read+0x60/0x184\n   pcie_aspm_pm_state_change+0x58/0xdc\n   pci_set_full_power_state+0xa8/0x114\n   pci_set_power_state+0xc4/0x120\n   qcom_pcie_enable_aspm+0x1c/0x3c [pcie_qcom]\n   pci_walk_bus+0x64/0xbc\n   qcom_pcie_host_post_init_2_7_0+0x28/0x34 [pcie_qcom]\n\nThe deadlock can easily be reproduced on machines like the Lenovo ThinkPad\nX13s by adding a delay to increase the race window during asynchronous\nprobe where another thread can take a write lock.\n\nAdd a new pci_set_power_state_locked() and associated helper functions that\ncan be called with the PCI bus semaphore held to avoid taking the read lock\ntwice.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.x86_64",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.aarch64",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.ppc64le",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.s390x",
          "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-26605",
          "url": "https://www.suse.com/security/cve/CVE-2024-26605"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220336 for CVE-2024-26605",
          "url": "https://bugzilla.suse.com/1220336"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-devel-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-macros-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-6.7.9-1.1.x86_64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.aarch64",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.ppc64le",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.s390x",
            "openSUSE Tumbleweed:kernel-source-vanilla-6.7.9-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-26605"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…