{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-livepatch-6_4_0-36-rt":"4-1.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.1","name":"kernel-livepatch-MICRO-6-0-RT_Update_12","purl":"pkg:rpm/suse/kernel-livepatch-MICRO-6-0-RT_Update_12&distro=SUSE%20Linux%20Micro%206.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4-1.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for the SUSE Linux Enterprise kernel 6.4.0-36.1 fixes various security issues\n\nThe following security issues were fixed:\n\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787).\n- CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1250192).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437).\n","id":"SUSE-SU-2026:20399-1","modified":"2026-01-19T15:33:28Z","published":"2026-01-19T15:33:28Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-202620399-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250192"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251787"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253437"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53676"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39682"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40204"}],"related":["CVE-2023-53676","CVE-2025-39682","CVE-2025-40204"],"summary":"Security update for the Linux Kernel RT (Live Patch 12 for SUSE Linux Enterprise Micro 6.0)","upstream":["CVE-2023-53676","CVE-2025-39682","CVE-2025-40204"]}