Known vulnerabilities in SUSE kernel-livepatch-5_14_21-150400_15_18-rt-debuginfo

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER

Main › Vulnerability Database › SUSE › kernel-livepatch-5_14_21-150400_15_18-rt-debuginfo

Known vulnerabilities in SUSE kernel-livepatch-5_14_21-150400_15_18-rt-debuginfo

Vendor: SUSE
Website: https://www.suse.com/
Total Security Bulletins: 9
10-150400.2.1 9-150400.2.1 8-150400.2.1 7-150400.2.1 6-150400.2.1 5-150400.2.1 3-150400.2.2 2-150400.2.2 1-150400.1.3.1

Security bulletins (9)

Secuity bulletin Severity Status Published
SB2024020543: SUSE update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP4) Low
Patched
05.02.2024
SB2023121378: SUSE update for the Linux Kernel RT (Live Patch 3 for SLE 15 SP5) Low
Patched
13.12.2023
SB2023102437: SUSE update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP4) Low
Patched Public exploit
24.10.2023
SB2023092627: SUSE update for the Linux Kernel RT (Live Patch 0 for SLE 15 SP5) Low
Patched
26.09.2023
SB2023091958: SUSE update for the Linux Kernel RT (Live Patch 6 for SLE 15 SP4) Medium
Patched
19.09.2023
SB2023073143: SUSE update for the Linux Kernel RT (Live Patch 1 for SLE 15 SP4) Low
Patched
31.07.2023
SB2023060511: SUSE update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP4) Low
Patched Exploited
05.06.2023
SB2023042512: SUSE update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP4) Low
Patched
25.04.2023
SB2023032843: SUSE update for the Linux Kernel Low
Patched
28.03.2023


Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or